Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

At its core, Anonymizer helps customers conceal their identities by serving as a middleman, receiving their traffic and giving it a new IP address selected from the vast block it controls. In practice, however, it’s much more complicated. As with most things in security, Cottrell says, “there’s definitely an arms race here.”

There are free tools online to help people surf the Web anonymously. Tor, for example, hides identity by channeling traffic through several proxies before it arrives at its destination. Tor, however, also has well-known performance issues. What’s more, Cottrell says that while Tor is a worthwhile project, it doesn’t match the needs of many business customers.

Cottrell says businesses typically seek one of three types of anonymity: they need to look like “nobody,” they need to look like “everybody,” or they need to look like “somebody.” Each need arises in a different situation.

The engineers doing research for a new product, for example, might want to look like nobody. As much as possible, they want their visits to competitors’ websites to look completely unremarkable. In that circumstance, Anonymizer helps them conceal the patterns in their activity, partly by making surfers from the company appear to be different users each time.

On the other hand, take the case of an airline that wants to research competitors’ prices. Cottrell says companies often block competitors from their sites or even feed them false information. In this situation, Anonymizer’s clients want to look like “everybody”—in other words, their inquiries should appear to come from the normal crowd of visitors. In a few months Anonymizer will release a new product specifically designed for this situation. Its algorithms simulate human activity on a website so that a company can make tens of thousands of inquiries without creating suspicion.

Finally, businesses sometimes need to maintain a persistent pseudonymous identity. For example, workers at a security company might want to visit a hacker forum for clues to the newest exploits. In that case, they want to be able to establish a reputation and a username—they just don’t want to reveal that they’re surfing from computers owned by, say an antivirus maker. In this case, Anonymizer can provide a consistent alternative IP address.

When the company opened for business in 1995, Cottrell says, it didn’t take nearly this much effort to conceal client identities—many websites were barely looking at who visited them. As websites have begun trying harder to personalize visitors’ experiences, however, they’ve also scrutinized visitors more closely. This has added urgency to his business. Cottrell says, “The same tools that are useful for customization are useful for tracking people.”

0 comments about this story. Start the discussion »

Credit: JR Rost

Tagged: Business, Business Impact, Securing Data

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me