If your life depended on the security and privacy of your
Internet connection, would you trust what you are using now? Or would you prefer
the same security the US Army uses for all communication classified as
TOP SECRET?
Did you know that almost all the data you send and receive over the Internet
is transmitted unencrypted and can be easily stolen? Spammers, hackers, data
thieves,
identity thieves and just about all kinds of bad guys simply love it. And yes,
this list may just as well include even your own government, your Internet
Service Provider or an overly curious boss or spouse. If you are not protecting yourselves, you
are an easy prey for them!
But what if there was a solution to this problem?
A sophisticated, yet
easy to use system that would protect the sensitive data you send and receive over the
Internet using an encryption technique so powerful that even the US
Department of Defense and the US Army is using it for protecting information
classified TOP SECRET? Encryption technique so powerful you
would need at least a few hundred years to break even with huge computer
networks? Encryption technique so powerful that even the best funded
intelligence agencies cannot break it?
Congratulations: You've just found such a solution. Welcome to
IdentityCloaker.com!
We will protect you from Internet spies and prying eyes!
The technology used to cause you harm is becoming more and
more affordable and widespread among the bad guys. What was restricted to
intelligence agencies and law enforcement just a few years ago, is now available
on the open market. The danger is *very* real and far more serious than you may
think. Obviously, we cannot protect you from every possible threat on the Internet.
But we will do our best to help you survive the Wild Wild West. And we will do
more than that!
What is Identity Cloaker?
In short, Identity Cloaker could be defined as an "Internet Privacy Protection
Service". Its main goal is to protect your privacy by encrypting the data
sent over the Internet in the most vulnerable part of the data transmission path,
and by hiding your physical location and IP address from prying eyes. There are, however, more advantages...
Do you want to see a website that is normally blocked by your Internet
Service Provider (ISP) or network administrator, or that can not be viewed
from your country? Do you manage Internet marketing campaigns targeted to
specific geographical locations through IP address based content delivery
and want to see the advertisements exactly as your potential customers in
different countries see them? Identity Cloaker can help you with that too.
What is Identity Cloaker *NOT* ?
1. Identity Cloaker is not a "Free Proxy Server Service".
Identity Cloaker is not some rubbish free proxy service that
hands you a huge list of so called free proxy servers, that are
either overloaded, not working, or even infected by viruses and other
nasty stuff. We do not rely on rubbish and neither should you! Instead,
IdentityCloaker.com operates its own growing network of private servers
around the world.
It's also important to note that free proxy servers are not
usually free at all. In most situations the administrators of the
physical server computers do not even know they are running a proxy
server. They simply either misconfigured some proxy server software they
intended to install for their own needs, or their server had been
compromised by a hacker who then installed such proxy server software
and probably caused some more evil along the way.
There are also reports of some free proxy servers being directly
owned by the bad guys. They may be owned by hackers operating on their
own, and sometimes even in organized gangs. They use such free proxy
servers as a lure that helps them in phishing attacks, gather your web
surfing habits, steal your sensitive information sent through such
servers etc. The risk is too high!
2. Identity Cloaker is not a "Web Based Proxy Service".
Web based proxy services (those websites you visit and enter the URL
address you want to access into a form field provided on such a
website), are usually Perl or PHP scripts that hide your IP address. To
use them, you must change your surfing habits and they do not work in
every situation because they have to rewrite the source html code - for
example to change image paths. This very often results in problems.
Not every page is displayed, or is displayed incorrectly. SSL
protected websites (those whose address in the URL bar starts with https://) and websites needing authentication,
such as membership websites,
work rarely. Web proxies can easily be blocked by network
administrators. And even if their domain is not blocked (yet), the
transferred data is unencrypted and it's easy for the network admin to
recognize what you do with such a service.
Imagine a situation when you want to visit a website that's normally
blocked. You use web proxy and visit the blocked web through it.
However, the network administrator (or your Internet Service Provider,
boss, spouse or hacker...) can see you visited the
web proxy website - but they can also see what you were doing when using
it! They can find out the visited websites and see the transferred data.
The consequences could be dire. Web based proxy services offer a very
low level of safety. They hide your IP address and allow you to access
*some* websites you normally could not. But that's about it.
3. Identity Cloaker is not "volunteer dependent".
Some anonymity networks and privacy protection services, including
the popular
TOR, rely on volunteers which results in unpredictable quality of
service, usually resulting in very low data transfer speeds and temporal
malfunction. Although such services can very often offer a great level
of security, they are intended mostly for transferring relatively small
amount of data.
By design, such services are generally unsuitable for everyday use
and for any services with high bandwidth requirements such as streaming
radio or video etc. They are also mostly intended for power-users only,
their complexity makes it difficult to use for the average computer
user.
How does Identity Cloaker work?
You simply download a small PC software application (no
installation necessary), run it, and choose one of our private proxy servers which you would
like to be connected through - or simply hit the Connect button if you
want to have one selected automatically.
When you click the Connect
button, a secure data tunnel encrypted with a military class encryption
cipher will be created to the selected proxy server.
This technique is commonly called SSH tunneling.
If you use any standard web browser, such as Internet Explorer,
Microsoft Edge, Google Chrome, Firefox or Safari (on Mac OS), there is nothing more you have to do, it will be
automatically set to use the new secure tunnel for all of your web browsing.
If you use a less common web browser, it's still possible to instruct the
Identity Cloaker application to cloak it too. It's now also possible to
cloak most other applications too.
Enough talking, let's take a look at the most common situations in
pictures:
Situation 1 - Browsing the web without Identity
Cloaker:
You visit a website - let's call it something.com
from your computer, your computer sends a request to something.com
and retrieves the data sent back from it. This is actually an oversimplification
but generally, it's how it works. The data on the whole path of the
communication between you and something.com is normally unencrypted
(unless secure https/ssl connection is used). Something.com can easily discover your physical location
by reading your IP address. And the part of the communication
between you and your Internet Service Provider is vulnerable to data eavesdropping.
Situation 2 - Browsing the web with Identity
Cloaker:
You visit a website - again, let's call it
something.com. The request is sent through the established encrypted
secure tunnel to the chosen Identity Cloaker proxy server. This is done in
the background - you do not even have to know about it. The proxy server
then sends the request to something.com on your behalf, receives
the answer and forwards it back to you - again through the encrypted secure
tunnel. At all time, something.com was communicating with the proxy
server and does not even know about you! The proxy server works as the
middleman.
For more examples, please take a look at our illustrations at the
How it works page.
How large is the IdenityCloaker.com network of secured proxy servers?
Our network of secured private proxy servers is growing all the time.
Currently, we have our servers located in Germany, Netherlands,
France, United
Kingdom, Italy, Ireland, Sweden, Canada, USA, Poland, Russia, Switzerland, Australia, Spain,
Norway, Portugal, Austria, Hong Kong, Singapore and Czech Republic. If there is interest, we may also add servers
in other
countries and parts of the world too.
Our system is very flexible and has been designed to be
able to increase its capacity easily, without sacrificing quality of the
service offered to our valued customers.
Right now, there are 34 servers with 550 IPs in
18 countries in the Identity Cloaker network
We should mention one thing. When we talk about "proxy servers" we mean
our own secured private proxy servers. Those are either physical computers
or Virtual Dedicated Servers we have
rented in several data centers throughout the world. We pay a monthly fee
for all of them. They all have 100Mbit or 1Gbit ports with monthly traffic allowance
usually in the terabytes.
If you have no idea what that means, it means that we have enough
capacity to offer any customer more than reasonable broadband speed of
data transfer. We do not rely on some low quality free proxy servers that
are almost always oversaturated, overloaded, and may be even infected by
malevolent software threatening - not helping, your privacy!
Another important characteristic of the IdentityCloaker.com system is
that the data transmitted between you and our private proxy servers is
encrypted using a military class encryption technique! This is an extremely important
feature, not offered even by premium services offering access to
private proxy servers.
What is necessary to be able to use Identity Cloaker?
As long as you can view this page and are using a Microsoft Windows
XP, Windows Vista, Windows 7, Windows 8 or Windows 10 computer or run MS Windows XP, Vista or
7 or 8 or 10 in a virtualized
environment, or you have any modern Mac computer you should be able to use Identity Cloaker. There are no
special requirements, really.
You can now also connect to our VPN (Virtual Private Network) servers
using any Android smartphone or tablet, iPhone or iPad.
Identity Cloaker will work even if you have to access the Internet
through an "internal" or company proxy server which is a common situation in some
companies and institutions. However, if Identity Cloaker does not work for you for any
reason and our technical support is not able to help you solve the
problem, we will refund your order without delay. Please see the "Fair
Deal Guarantee" info box below. There is absolutely no risk for
you!
By the way, there is one thing we should mention but it's somewhat
controversial... Identity Cloaker does use an extremely powerful
technique that allows you to override any web browsing restrictions set
on the company firewall level by its administrator. This technique is
sometimes colloquially called "punching holes in firewalls".
Identity Cloaker creates a secure tunnel connection between your PC
(or another device, see above) and one of the Identity Cloaker proxy servers. Once it is established
(through the company firewall), you gain the same web access rights as
the Identity Cloaker proxy server itself. And since the proxy server can
access just about any website, so can you...and without anyone knowing!
For more details about how this all works, please take a look at the
How it works page.
Identity Cloaker is a very powerful tool, please use it responsibly
and with caution!
It all sounds a bit complicated, how easy is it to use?
Identity Cloaker is a complex and sophisticated system, no doubt about it. However,
from the very beginning, it has been designed to be very easy to use
even for
the average computer user. You do not really need to care about what's
going on in the background, you do not need to worry about the technical
stuff at all.
All you need to do is to download a small Windows PC
or Mac application (Android and iOS solutions are available too), follow a few easy to understand on-screen instructions
(normally just hitting the Enter button a few times) to "install" it and click the
"Connect" button. How easy is that ;)
Of course, if you do want to know what is going on in the background, or
you just love the technical stuff, we have no problem with that either. Just
take a look at the
How it works page, the Frequently Asked Questions,
or contact us through our helpdesk. We will be more
than happy to answer any question you may have.
UPDATE: Mostly intended for the demanding power users,
we now offer also
OpenVPN
and "L2TP over IPSec"
access to all of our servers beside of our standard service! The
VPN access is currently being offered as a part of the standard
subscription service, with no additional fee.
How much is your privacy worth?
We believe that privacy and safety should not be luxury. While it would
be great if we could offer our services for free, this is,
unfortunately, not possible. And in fact, this is the good news for you! By
charging a small fee we are able to deliver a high quality service, and we can keep improving it. Identity Cloaker is a premium
service, but don't worry, our prices are not premium :)
So how much does it cost to get access to our broadband secured private proxy
servers, super safe surfing through SSH tunneling and VPN backed by 256-bit military
class encryption, our own custom-coded Microsoft Windows XP/Vista/7/8/10/Mac compatible
client software and our exclusive private membership website?
Less than €6.67 a month! Yes, that's six Euros and
sixty seven Cents - you can use our
currency conversion tool to see the amount in your local currency.
So again, what are the main benefits of Identity Cloaker?
But what's most important:
We will protect your privacy!