Fraud Series Part 4: Proxy Traffic
Proxy traffic is an interesting one. Commonly referred to as the Tor network, Tor just happens to be the most common proxy network. Tor browsing works by bouncing users’ communications through a distributed network of relays all around the world, effectively anonimizing users’ traffic. While proxy networks have a very legitimate use for individuals with privacy concerns as it prevents third parties from surveilling their internet connection to gather data such as what sites they visit and their physical location, it of course has less legitimate uses as well…