A transparent proxy is a middle man system used by your ISP that unknowingly to you redirects all your traffic on it’s way to the Internet and back. During this redirection process, all your HTTP traffic can and probably is logged, read and analysed. I strongly believe that your Internet traffic information is yours to own. That is why it is important to read this article in order to understand how to transparent proxies work, their dangers, how to detectthem and how to protect yourself. https://thevpn.guru/wp-content/uploads/2014/03/Transparent-Proxy-Ini
Why do they use transparent proxies?
- They can cache incoming web data, This is one of the benefits of a proxy cache. This allows your ISP to save a huge amount of bandwidth while serving the requested cached data much faster.
- They can force users to use your proxy, allowing password checking,web filtering, and other functions. – Yes, they can see what you are doing and act upon it, for example they can limit your download speed if their proxy server sees that you are downloading an mp3 file.
- On the fly image optimization – Ive seen this on some ISPs where they automatically compress the requested images to save bandwidth. This is good for mobile users since you will only download less data but there are instances where the image is totally compressed to the point that you really can not see the image anymore.
- They can allocate your traffic to go out other gateways aside from your default, without needing to use load-balancing software or BGP.
- Bandwidth throttling and tethering detection – They can also use this to throttle your internet connection and detect if you are tethering your mobile internet connection.