Originally Posted by Tyrant01
However I would also like to be able to surf anonymously. (..) 1) Is it possible to, (..) surf the internet anonymously using multiple proxies
There's a lot of docs on the 'net about "anonymous surfing". Most docs about anonymity expect you to research and know details yourself (which I think is good) but since you stated you're inexperienced I thought it best to provide you with some pointers for starting up your research to find out if you want it (or rather: need it).
- About TCP. TCP connects an endpoint to another endpoint. In essence this protocol does not allow for anonymity as (the operator of) each "next hop" has the addresses of both endpoints of the connection.
- About using open proxies. Using publicly accessable open proxies usually isn't legitimate because you'll be using what is not rightfully yours. Most of the proxies (HTTP, Wingates, etc cetera) are not accessable because the operators invite you to hog their bandwidth but because of misconfiguration. (And for anyone who succumbs to false reasoning saying it isn't all that bad, imagine you running a proxy on your network and someone maxing out on your bandwidth. Now tell me again it isn't all that bad.)
- Using services through proxies (or asking for proxy methods) usually is not associated with activities that are benign and legal. "Hiding" behind a proxy or chained proxies is not going to help for example in the case of IRC because IRC servers actively scan for them. A proxy may keep logs (even if they advertise they don't), be subverted (cracked) or be used for observation or be unreliable. Statistics of open connections and service logs provide an audit trail. Operators working together (or being forced to submit data) may yield the originating address.
- Privacy. The best prevention in general (when using more or less anonymous realtime electronic communication) is not to give people any reasons to try and pull tricks on you. Like not giving away personal details to people you don't know, run scripts you don't understand, accept direct connections from people you don't know or run scripts or binaries for people you don't know.
- General precautions. If you're concerned for privacy for the right reasons (citizens of certain states, those sharing sensitive information, etc, etc) you best take precautions first like strict firewalling (have an audit log yourself helps pinpoint problems) and content filtering (unwanted redirections), disabling any tracking and identity-revealing features, plugins and scripting and stay away from using applications that use a centralised setup (as in log audits).
- Alternatives There exist "alternatives" for different protocols:
- E-mail. No proxies needed. Just GnuPG your messages.
- HTTP. Mainly JAP and TOR. JAP is in the unpaid version deliberately very slow. TOR is low bandwidth (high latency) too and the TOR community does filter and doesn't take kindly to bandwidth hogging and any illegal activity.
- IRC. If you want a secured connection to the IRCd have a look at SILC.
- For some apps or services not listed there may be decentralised alternatives (research them yourself), but none should be perceived as "the ultimate guarantee" for anonimity.