""From a security perspective, hiding your true location behind
a proxy definitely falls in the gray area of Web browsing," says Ed
Ziots, a Rhode Island-based network engineer. "I use them to view
questionable content from semi-trusted systems because I do not
want the site to know the true origin of my communications when I
am researching the latest exploits, exploit code, or new and
up-and-coming trends in exploit research.""