On page 104 of Unwired there's a section on using a second node (or more in a chain) as a proxy server, but their benefit is described in two ways.
First, all communications sent from the user appear to come from the proxy node, so to trace back to the true source one would need to trace back to the proxy and then examine the access log to find out who's been playing silly buggers, assuming the log hasn't been edited in the meantime.
Second, the user's Response is reduced by 1 for each proxy used but in return all traces against him have the threshold increased by 4 for each.
So what's the difference between using a proxy the first way and using it the second way?
If there is no difference, why would anyone go the second route which offers weaker protection at a price?