Can you elaborate on the methods or tools used to detect if someone is utilizing a proxy in their online activities? Are there specific indicators or patterns that can be identified to suggest the presence of a proxy? How reliable are these detection methods, and what are the potential limitations or challenges in accurately identifying proxy usage? Furthermore, what are the potential implications or consequences of detecting proxy usage in the context of cryptocurrency transactions or financial activities?