Skip to content

Instantly share code, notes, and snippets.

What would you like to do?


About and Terms

Calyphrox webproxy is just like a standard piece of network infrastructure. The proxy doesn't inspect or modify content; it just relays messages back and forth between a source and a client anonymously. it helps you browse the web in an anonymous way by requesting the content you wanna see beforehand and delivering it to you in a mirrored fashion without exposing sensitive data such as your IP, user agent or country; The proxy instead uses its own info (it's own IP address for example) when requesting pages so you can remain anonymous and secure at any time.

Besides helping you remain anonymous, a webproxy could be useful in a variety of situations such as when you're trying to reach some content you can't see by your own due to different factors as:

  • Server Errors
  • Country/ISP or Firewall Blockings
  • Bandwidth Limits

among others. In addition to it's normal proxying abilities, Calyphrox also can handle ".onion" domains (those from the deep web) without the need from you to install someting on your PC (as the TOR Client for example) to access them. The goal with this proxy is letting all of it's users to access most of the available info out there on the internet without any limitations because (at least for us) every human being has the right of knowledge.

DMCA requests

17 USC 512(a) (part of the DMCA) says:

A service provider shall not be liable ... for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a system ... operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if --

  1. the transmission of the material was initiated by or at the direction of a person other than the service provider;

  2. the transmission ... is carried out through an automatic technical process without selection of the material by the service provider;

  3. the service provider does not select the recipients of the material except as an automatic response to the request of another person;

  4. no copy of the material made ... is maintained ... in a manner ordinarily accessible to anyone other than anticipated recipients [or] for a longer period than is reasonably necessary for the transmission...

  5. the material is transmitted ... without modification of its content.

512(b) extends the immunity to "generally accepted industry standard" caching.

(The DMCA takedown notice procedures you may have heard of are part of 512(c) and only apply to services that store copies of material.)

Other copyright requests does not provide, select, or host the content available on Tor hidden services that are accessible through the service, (nor any of the other content accesible through this webproxy), just as other Internet Service Providers do not provide, select, or host the content accessible on the Internet by their users. Like other ISPs, we are protected under United States law by 47 U.S.C. § 230 and 17 U.S.C. § 512(a), among other laws. We, like other ISPs, have no obligation to block access to sites that we do not host, even if those sites themselves may host material that other parties assert their some legal right. For more information, see the Tor legal FAQ.

In simple words...

We are not responsible for what you (the end user) do with our proxy or the consequences it's misuse could bring upon you, so please use it wisely and avoid illegal activities. This is a tool for good with the noble prupose of being a gateway between the users and the global knowledge ready to be used when it's needed for a legal and fair reason, if you think otherwise about it, you're wrong.

Finally: is this secure?

Yes. When browsing through calyphrox your computer is never involved in the content requests you make to the web, so everything you browse through our proxy can't be tracked down to you. It not only helps you simulate another IP address (in this case a Google one) but also ensures you never leave any digital footprint behind.

In the case of Deep Web browsing it is the same. The final endpoint the info gets to is a Calyphrox server that mirrors that to you, Calyphrox makes the request through the TOR Network and brings the content back, but your IP/User agent and other data are never involved in the request, so you can rest easy knowing your browsing it's indeed private.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.