We explain in simple terms what proxy servers are, proxy-store, what they are and the difference between proxies and VPNs.
What is a proxy server
A proxy-server or simply a proxy is a computer that mediates between a user and a target server. The client first connects to the proxy server and requests the desired resource located on another server. For example, a mail or an html page. The proxy then either connects to the designated server and retrieves the resource from it, or returns the resource from its own cache.
Companies use proxies for security, to improve network performance, and to access "remote" resources. Individuals use proxies to anonymize traffic or bypass access restrictions.
When we talk about proxies, we usually mean a direct proxy. Imagine we make a request, for example, trying to go to GitHub - enter the URL, press Enter. The proxy doesn't connect us to GitHub directly, but intercepts the connection and updates the content of the request by removing the incoming IP and changing the header. As a result, GitHub assumes that the request came from another computer and sends the required data to the proxy instead of us. The proxy takes the GitHub information, checks it, and sends it to our computer.
How proxies are used
Common uses for proxies:
Increasing network security by encrypting requests;
Preventing interception of sensitive information;
Blocking malicious sites and advertising;
caching of sites to save traffic;
controlling the use of the network channel;
domain blocking;
monitoring and logging of web requests;
Testing web resources from different IPs.
You can propose your own variants in comments to the publication.
What types of proxy servers are available
A transparent proxy is the simplest kind; you don't even have to specify any proxy settings in your browser. A transparent proxy simply intercepts incoming HTTP traffic. It makes the user feel like they're surfing the web without a proxy. Example of use: filtering entertainment websites on an educational network.
An anonymous proxy never transmits the client's IP address to the target resource. A good option if you don't want targeted ads tracking you or your location. A high anonymity proxy does not transmit an IP address or personal information and does not even identify itself as a proxy. The IP address changes periodically in the process - this allows for maximum privacy. The TOR browser uses this type of proxy. Because the IP changes, it is extremely difficult to trace the source of the requests.
A distorting proxy works similarly to an anonymous proxy, but transmits a deliberately false IP address. This approach is used to bypass local restrictions on accessing content.
Residential proxies use real (white, static) IP addresses. To the servers they look like regular clients. The opposite of a resident proxy is a data center proxy which has IP addresses not bound to a real device. Cloud providers have high-speed Internet connections. However, if one server hosts hundreds of proxies, they will all have the same IP address.
The public proxy is the most insecure and unreliable. It could "drop out" at any moment and is vulnerable to hacker attacks. It is not difficult to find the lists of free public proxies, but it is almost impossible to find a good public proxy.
A private proxy can be used by only one client at a time and is authenticated before being used. It is a more reliable version of a public proxy. A private proxy can be transparent or highly anonymous like its proxies described above, such as a resident proxy or a data center proxy.
A shared proxy is one of the cheapest types of proxies. The rent for the server is divided between clients which have simultaneous access to it.
A rotating proxy for a new client gives a new IP address. That is the same IP is not used more than once. A rotating server provides a high level of security and confidentiality.
SSL proxies work on principle of HTTPS requests - requests between client and server are secured with encryption.
A reverse proxy offers a completely different approach to proxying. It hides not the client's IP address but the IP address of the server the request is being sent to. The tool is used to control access to the server and limit uncontrolled access to the database, as well as to reduce traffic by caching information.
What is the difference between a proxy and a VPN
The main difference between a proxy and a VPN is that a VPN protects all network traffic, while a proxy only protects Internet traffic. A proxy passes requests by acting as an intermediary, while a VPN tunnels all network activity down to the operating system level.
Companies use VPNs to give employees access to corporate resources without having to worry that traffic will be intercepted or crammed by the ISP. If he gets the usage history, it will only show that you are connected to a VPN. You won't be able to find out anything about the traffic.
Despite all the advantages, a VPN versus a proxy has disadvantages:
A VPN is more expensive;
The connection is usually slower.
For many tasks, a VPN's level of security may be redundant. If you just want to mask activity in an application, it's worth considering a proxy server.
Conclusion
The use of proxies is justified when it is necessary to hide or protect information. Above we have reviewed the list of tasks that can be solved with the help of proxies. As we have seen, there are advantages in using proxies:
Security and privacy of data on the Internet;
the possibility to bypass the restrictions related to geolocation;
the ability to improve network performance;
the ability to control access to sites.
But there are also disadvantages:
requests may return slower than direct access;
not all proxies encrypt data, proxy selection should be done with caution;
free and cheap proxies can be attacked and as a result the data can be intercepted by scammers;
all information always goes through a third party which can be controlled by anyone.