The authenticity of a website is tested with software that runs on a
personal computing device and a service that is provided via the
Internet. The software on the personal computing device is in the form of
a proxy, or transparent component in the Internet Protocol
implementation. The proxy receives all outbound messages, analyzes them
and forwards or modifies them without the user's intervention. The
service tests the IP address and/or the behavior of the target website.