Privacy Policy

Who we are

We are a team of researchers at Brigham Young University studying malicious transparent proxies used in phishing by threat actors. We’re dedicated to developing technology to detect and block such threat actors.

What do we collect?

We carefully log the following things from each visit to our website:

  • IP address of the sender. This is never used to identify specific individuals, but instead to see if the request came from one of our many reverse proxies.
  • Full HTTP headers of the request. This is used to determine what changes each proxy is making to the request headers before they arrive at the web server.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. The login page is intended for site administrators only. Once an administrator logs in a cookie is placed in their browser to keep track of their login session. This cookie lasts for two days and is only associated with a login session, no other data is collected that could correlate that session to an individual.

Who we share your data with

Absolutely no one. We will use the HTTP headers we collect to generate rule lists that can be used to block malicious proxies. This general rule set will be published with the rest of our research, and nothing else.

How long we retain your data

The HTTP headers and IP addresses that we collect will be retained for one year after the date of collection in case we need to make refinements to our ruleset, after which they will be deleted.

What rights you have over your data

By using our site you consent to have your HTTP requests and IP address logged. Because the data we gather is so minimal, we cannot trace any logs back to an individual user and therefore cannot delete any logs upon request.

Where your data is sent

Nowhere. We have a pretty simple setup, so your headers and IP address never leaves our web server.