Proxies can be a powerful way to enforce anonymity or to bypass various kinds of restrictions on Internet (government censorship, regional contents, …). In this post, I’ll describe a simple technique to create a transparent proxy at the system level. It’s especially useful in cases when you want to make sure that all connections make it through the proxy or when your application of interest doesn’t have proxy support.
Over the past several weeks I’ve been hitting one concept over and over again: “reference”. I’m talking here about the idea of a reference implementation; and I don’t mean something so comprehensive that it’s almost useless..