The fake IP methods are very dangerous for the user's vulnerability to identity theft. Everything you do through a proxy can be captured and logged, including passwords, credit card info and whatever else there is in the communication, including anything encrypted.

Since this topic has no where to go but downhill, it is being locked.


Jim "Oldgas" Potts
Your host and moderator