Consider the analogy of a Stock Proxy: you authorize a person to vote on your behalf.
The proxy
appears to do your bidding, but holding your authorization, any new subjects that arise are handled by the agent without further discussion with the stock holder.
A
compute proxy is very similar: you authorize it (defacto by accessing it instead of the Internet directly),
and the
compute proxy does as it pleases, including
- redirecting to other sites,
- filtering the replies
- and/or denying access.
The
anonymous access is entirely a side-effect in that your IP address is never seen
as a referrer header sent from the proxy to the real server - - it could, but doesn't.
In addition, the website that gets the proxy request, sees only the IP address of the proxy itself. Chain two-three proxies serially and the website can not find your IP.
You may be aware that you can proxy ANY tcp/ip protocol; email{in & out}, http, dns, dhcp, and even https.
99% of the time, we use proxies for achieve {A-C}