I see nobody here has asked this question. What if one, instead of just using a single proxy, connected a proxy-to-proxy in a very long chain and downloaded something (illegal) using secure packets (so no one can see what OS, etc.) through the long chain of proxies back to them?
Wouldn't it be too wasteful to go through dozens of proxies finding the last log from the last proxy to continue finding the proxy before that, etc., for authorities to bother with or time to spend for it?
Also, what if one placed an illegal ISO, say, on a cloud server from a chain of proxies, and then, from another device using the same method, one could download the file, and nobody could:
1.Tell who uploaded it without extreme difficulty, if even bothered/possible.
2.Tell who downloaded it, or whether or not anyone can prove that what one uploaded through the chain is illegal in the first place, and that the downloader has knowledge of this(e.g. name similarity, mismatch, misidentification of file name, hard encryption format that the downloader only knows the key to).
So here's my overview:
Does a chain of proxies make it harder and harder for authorities to trace the original IP?
Can't hard encryption prevent anyone from identifying what a file contains if one can't decrypt it, thus, letting illegality off the hook?