Board Thread:General Discussion/@comment-3572067-20130108013231/@comment-5336596-20130407181703

Penguin-Pal wrote: Xonius wrote: Penguin-Pal wrote: Please note! Proxy servers are mostly used by hackers, who are experienced enough to collect all the information about you and the data that you share in the internet.

If you're submiting a password and user names while using Proxy, some hacker somewhere around the world has probably logged this data. Hackers aren't necessarily the only people who use proxies, as when blocking a single web link with a 403 error, unknown servers you want would need a proxy to access the server, only as a backdoor. I mean that they are operated by hackers. Not all of them, but a smart hacker can collect personal info such as passwords, and then abuse it. There is a pretty interesting youtube video about this here.

You don't necessarily have to be a smart hacker in order to operate a proxy. New technology allows for almost anyone from any skill set would be able to run simple commands. These include programs such as Burp Suite and THC's Hydra GTK. Users like this inherited the nickname "Trakhacks" for their use of the forensics program Backtrack 5 r3.