addrproxy · §I. Principles §II. Apparatus §III. Correspondence §IV. Codex
Institutum pro Obfuscatione Correspondentiae Being Volume the First

addrproxy

On the Art & Science of
Correspondence Obfuscation

Published in the Year of Our Network, MMXXVI

Turn the page
I

The Doctrine of Concealment

In the vast cartography of networked communication, there exists a fundamental tension between the necessity of addressing and the desire for concealment. The address proxy stands as the ancient mediator of this tension — a disciplined intermediary that accepts correspondence bearing one address and dispatches it under another, preserving the letter while dissolving its provenance.

The practice is neither new nor novel. From the coded letter-drops of Renaissance diplomacy to the anonymous remailers of the nascent internet, the principle remains unchanged: to sever the observable link between sender and recipient, one interposes a trusted third party who knows both but reveals neither.

This doctrine rests upon three pillars, each essential to the integrity of the proxy function:

  1. Opacity of Origin. The recipient shall not discern the true source of any proxied communication.
  2. Fidelity of Delivery. The message shall arrive complete, unaltered, and timely.
  3. Discretion of the Intermediary. The proxy shall maintain no permanent record that could later betray the association it conceals.
“The proxy is not a wall but a mirror — it reflects back to each party only what that party expects to see.”

A proxy that fails any one of these pillars is no proxy at all; it is merely a witness, and witnesses, history tells us, are readily subpoenaed. The entire enterprise of address obfuscation therefore demands not only technical rigour but an institutional temperament — a cultivated indifference to curiosity, a resolute refusal to retain what was never needed in the first place.

§ Proxy Chain Diagram — showing the progressive concealment of origin through successive envelopes, each sealed in wax bearing the proxy’s device.
II

The Proxy Chain — catena interposita

Where a single proxy provides concealment, a chain of proxies provides assurance. The proxy chain — or, as the classical scholars termed it, the catena interposita — routes a message through multiple intermediaries in sequence, each aware only of its immediate predecessor and successor.

Consider the topology: a sender A wishes to reach a recipient D without D knowing the origin. Through the proxy chain A → B → C → D, each node performs a single translation. The chain is only as weak as its most compromised link, yet even that compromise reveals merely a fragment of the whole.

The elegance of the proxy chain lies in its modularity. Nodes may be added or removed; the route may be altered dynamically without the sender or recipient being aware of the change. The chain distributes trust rather than concentrating it, achieving a robustness that no single-point proxy can match.

“Let no courier know more than he must deliver; let no station keep more than it must forward.”

Scholars of the discipline note that the optimum chain length is a matter of careful calibration — too few links leave the origin recoverable by modest correlation; too many introduce latency that degrades the fidelity of delivery. Three to five intermediaries is generally adequate for correspondence of ordinary sensitivity.

§ The Correspondence Cipher — an ornamental cipher wheel, bordered in acanthus scrollwork and circuit traces, used in the composition of double-keyed envelopes.
III

On Encryption & Trust

The proxy chain, for all its structural elegance, is incomplete without the armour of encryption. Without cryptographic assurance, each intermediate node could read, modify, or misroute the message it carries. Encryption transforms the proxy from a position of trust into a position of verifiable ignorance — the proxy handles what it cannot read.

In the layered encryption model — known colloquially as “onion routing” — the sender wraps the message in successive shells of encryption, one for each node in the chain. The outermost layer is decryptable only by the first proxy; once removed, it reveals the address of the second proxy and another encrypted payload. And so on, like a courier opening nested envelopes, each one addressed only as far as the next hand.

Trust, in this paradigm, is neither assumed nor required. It is engineered away. The system presupposes that any individual node may be compromised and designs around that assumption.

“We do not ask the courier to avert his eyes — we seal the letter such that his gaze, should it fall, discovers nothing.”

Address proxying, secured by encryption, forms the backbone of privacy-preserving services: anonymous browsing, whistleblower platforms, censorship circumvention, and the quiet, everyday act of maintaining digital boundaries. It is the prosaic machinery by which an extraordinary civic principle — the right to be unobserved — is made operational at scale.

IV

The Modern Practice

Today, the discipline of address proxying has evolved from a clandestine art into a critical infrastructure of the open internet. What was once the province of intelligence services and activist networks is now a daily utility, employed by millions who simply wish to maintain the boundary between their private identity and their public activity.

The modern proxy practitioner operates at multiple strata of the network stack. At the application layer, HTTP and SOCKS proxies intercept and relay web requests, substituting origin addresses. At the network layer, Virtual Private Networks tunnel all traffic through encrypted channels. At the transport layer, onion-routed networks like Tor distribute trust across a global mesh of volunteer relays.

Yet the fundamental principles remain those articulated by the earliest scholars:

  • The proxy must serve as an opaque intermediary, revealing nothing of the true source.
  • The path must preserve the integrity and timeliness of the message.
  • The system must minimize retained knowledge — logs, metadata, timing correlations — that could later be compelled or compromised.
addrproxy.com exists to uphold this tradition — to provide the infrastructure of concealment with the rigour of a centuries-old institution.”

In an age of pervasive surveillance, the address proxy is not merely a technical convenience but a civic necessity. Its practitioners are the inheritors of a discipline older than the internet itself — the quiet scholars of the in-between, who ensure that a letter may be read only by its proper reader, and that the path between them remains, as it always should have been, nobody’s business.