{"id":335,"date":"2006-01-02T00:00:00","date_gmt":"2006-01-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/02\/ip-cloaking-becoming-a-business-necessity\/"},"modified":"2021-12-30T11:37:03","modified_gmt":"2021-12-30T11:37:03","slug":"ip-cloaking-becoming-a-business-necessity","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/02\/ip-cloaking-becoming-a-business-necessity\/","title":{"rendered":"IP cloaking becoming a business necessity"},"content":{"rendered":"<p>Lawyers, investment bankers, consultants, executives and directors suddenly hammered the investor relations section of the targeted firm&#8217;s Web site.  &#8220;This seems to be a very common scenario,&#8221; explained Lance Cottrell, founder, president and chief scientist for San Diego-based Anonymizer Inc., at the Usenix Large Installation System Administration conference.  Though his 11-year-old company is best known for consumer privacy, enterprise interest has surged regarding cloaking online activity used to gather intelligence and prevent information leakage.  &#8220;You&#8217;re really advertising to people what you&#8217;re doing and what your interests are,&#8221; Cottrell said during a presentation on Internet counter-intelligence.  One retail tire store found itself in a frustrating situation due to this technique, Cottrell recalled.  The company advertised that it would match any competitor&#8217;s price, but when a customer would come in and cite someone else&#8217;s online deal, the tire shop couldn&#8217;t look it up on the Web because its IP address had been blocked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IP-based spoofing, on the other hand, directs certain IP addresses to fake Web sites containing false or misleading information.  Another, similar technique is IP-based cloaking, which configures a legitimate Web site to display inaccurate or incomplete information only when it is accessed from certain IP addresses.  Redirect spoofing sends specific traffic to an alternate page within the site.<\/p>\n<p>For instance, if one airline knows a competitor checks its site for fares daily, it can jack up the price only when a rival&#8217;s IP address tries to access the site.<\/p>\n<p>Major retailers sometimes employ this technique by displaying only expensive merchandise based on customers&#8217; past buying habits.<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/articles.php?art_id=102&#038;PHPSESSID=8af89b3eb8240a0e33ca65c806a8ac16<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-335","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=335"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/335\/revisions"}],"predecessor-version":[{"id":2822,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/335\/revisions\/2822"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}