VPNs vs. Proxies: What’s the Difference? – PCMag

02DytSZ6leHmoxs2D5fOgxB ProxyEgg VPNs vs. Proxies: What's the Difference? - PCMag

While VPNs are sucking up all the oxygen in the privacy conversation, there is a similar technology that hasn’t gotten the same attention: the humble proxy. We asked experts from two leading VPN companies just what the difference is and whether you need one, both, or neither. Granted, both companies have an interest in promoting VPNs, but they remain experts in how privacy products work. Furthermore, NordVPN also offers its own proxy product with its VPN service.

What Is a Proxy? (Hint: It’s Not a VPN)

Proxies are like cousins to VPNs. Like a VPN, they can reroute your web traffic to make it appear as if it is coming from somewhere else, hiding your real IP address in the process. Kiril Mikulskij, the Network Engineering Team Lead at NordVPN, explained that proxies work by “transporting your traffic between your client machine and a proxy server by encapsulating it in some kind of outer header.” Like a VPN, a proxy sends your web traffic to the proxy server, which, Mikulskij says, spits it back out onto the internet. 

A VPN, Mikulskij said, adds layers to this basic process. “A VPN works in a very similar fashion but on top of the encapsulation, we add encryption by default and ensure the packets are authenticated.” 

With a VPN, you can be reasonably certain all of your web traffic is encrypted, but that’s not always the case with proxies. Laurent Fasnacht, who leads the R&D at ProtonVPN, explained that proxies using SOCKS and HTTP protocols do not encrypt user traffic. SSL or HTTPS proxies, but not HTTP proxies that forward to HTTPS, do encrypt user traffic. 

“I would strongly recommend against using non-encrypted proxies, as they don’t provide any protection,” said Fasnacht. “Nowadays encryption should be the norm for any service. There is absolutely no excuse not to use it.”

Another key difference is how the connections are made. “With the VPN server it’s kind of a tunnel that will stay there,” said Fasnacht. VPN connections are usually handled at the OS level and apply to all web traffic from your machine. “Whenever your computer wants to send some traffic, it goes through the [VPN] tunnel.” 

A proxy is different. Mikulskij explained that each application requires its own proxy connection. In practical terms, the proxy connection to handle your browser traffic won’t work for another application on your machine. This leaves lots of opportunities for web traffic to leave your machine outside the proxy connection.

Do You Need a Proxy—Or a VPN, For That Matter?

Both of the VPN experts agreed that a VPN does a better job obscuring your web traffic and protecting your privacy. However, there are some uses for proxies, depending on what you’re trying to accomplish.

Fasnacht said that while a VPN encrypts all the traffic from your machine, it often requires higher levels of permissions to do so. A proxy, however, can be set up without any special permissions. There are several sites out on the web that function as proxies, where you type in a URL and browse the destination site through the proxy site in your browser. You may recall these from a reckless youth spent trying to circumvent restrictions on your high school’s internet connection.

Mikulskij likewise noted that if all you care about is unblocking websites or making your traffic appear as if it were coming from somewhere else, you can do this quickly and easily with a proxy. He did point out that many VPNs offer lots of servers in different locations, as well as additional privacy tools, that make it potentially more attractive.

Notably, several VPN services offer browser plug-ins that are really proxies. Mikulskij confirmed that NordVPN’s browser plug-in provides an encrypted proxy connection.

Recommended by Our Editors

Both Fasnacht and Mikulskij also agreed that there wasn’t any sense in using a VPN and a proxy simultaneously. Routing web traffic through a VPN alone will always reduce speed and performance, and adding the additional layer of complexity from a proxy makes it a recipe for extremely bad performance.

How to Choose Between VPNs and Proxies

With security and privacy products, it can often be difficult to sort out what is mere marketing and what the product will actually do for you.

“For me it’s a bit annoying when, as a tech guy, I see people making the wrong choices because of ads, because of bad explanations,” said Fasnacht. He suggested that consumers work to research the products, even if it’s complex to do so. Learning what a product can actually do and understanding what you want to use it for in the first place, would guide consumers to better choices—especially when products are given away for free.

That’s especially true for VPNs and proxies, which could potentially monitor your online activity for advertising or other nefarious purposes. Free products, especially, need scrutiny since they need money from somewhere to continue operating.

Understanding what the product you’re using actually does is essential as is knowing how it makes money, Fasnacht said. That’s especially true if it doesn’t cost anything. “If it’s free,” said Fasnacht, “why is it free?”

<div x-data="window.newsletters()" x-init="initNewsletter({"id":5,"list_id":17707707,"status":"Published","title":"SecurityWatch","deck":"Our experts keep you safe from malware, viruses, hacks, and privacy exploits by keeping you current on the latest vulnerabilities.","slug":"securitywatch","courier_list":"PCMag Security Watch","image":{"path":"newsletters\/17707707.jpg","metadata":[]},"preview_link":"https:\/\/secure.campaigner.com\/csb\/Public\/show\/g6xi-2fbk9l–vmbga-b5ekdoe7","contextual_title":"Like What You're Reading?","contextual_deck":"Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.","first_published_at":"2021-09-30T21:22:09.000000Z","published_at":"2022-03-24T14:57:33.000000Z","last_published_at":"2022-03-24T14:57:28.000000Z","created_at":null,"updated_at":"2022-03-24T14:57:33.000000Z"})” x-show=”showEmailSignUp()” class=”rounded bg-gray-lightest text-center md:px-32 md:py-8 p-4 mt-8 container-xs” readability=”31.423799582463″>

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Source of this news: https://www.pcmag.com/how-to/vpns-vs-proxies-whats-the-difference

Related posts:

How To Get A New Netflix Series On Your Subscription? - Film Threat
There are also some problems in getting new Netflix series on your subscription because of geo-restriction. If you are not in the USA then you still can’t get new Netflix series on your subscription....
Fix Epic Games connection error, issues and problems on Windows 11/10 - TWCN Tech News
This post lists some general fixes for Epic Games connection errors, issues and problems on Windows 11/10. You may, sometimes, encounter connection issues while playing Fortnite or signing into the E...
What Is A Proxy Server: Everything You Have To Know - Robots.net
Business is good because anyone can start their own business from scratch. People can design and build their products to suit their liking. Then connect with suppliers, manufacturers, and dis...
Achronix Announces First Quarter 2021 Financial Results and Business Highlights - Yahoo Finance
Achronix Semiconductor Corporation, a leader in high-performance field-programmable gate arrays (FPGAs) and embedded FPGA (eFPGA) IP, today announced financial results for the first quarter of 2021, ...
Choose a Proxy Server and / or maybe VPN in 2022? guidebook jim o brien
Both VPN and also proxies appear to have become buzzwords in the world of internet security. Few people know the difference or this also actual benefits either with this two options offers, thoug...
Censorship in the Age of Large Cloud Providers - Lawfare
Internet censors have a new strategy in their bid to block applications and websites: pressuring the large cloud providers that host them. These providers have concerns that are much broader than the...
How to Hide Your IP Address - Lee Stanton - Alphr
Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way. Websites keep track of your IP address for various reasons, and in most cases, it’s n...
A High-Tech Alliance: Challenges and Opportunities for U.S.-Japan Science and Technology Collaborati...
SummaryIn both Japan and the United States, there is a growing recognition that national security and alliance security involve more than just military concerns and extend to new technology areas and...
Dispersion trades are back after losing big in 2020 - Risk.net
An equity derivatives trade that lost hundreds of millions of dollars during the Covid-19 selloff last March is suddenly popular again. The prospect of rising inflation leading to further sector rota...
AgriFORCE Growing Systems Sets your dog's Sights on New Troublesome Agricultural IP in Proceed to Pu...
Imagine by Syahir Hakim within Pixabay Whether it be drought conditions, inefficiencies drawn from old classic practices or an incapability to gain the technical professor needed to c...
PolarProxy 0.9 Released - Security Boulevard
PolarProxy was previously designed to only run as a transparent TLS proxy.But due to popular demand we’ve now extended PolarProxy to also include a SOCKS proxy and a HTTP CONNECT proxy.PolarProxy a...
New-fangled Payment Data Stealing Spyware and adware Hides in Nginx Action on Linux Servers how to p...
Commerce en ligne platforms in the U. S i9000., Germany, and France came under attack from a new malware that targets Nginx servers in an attempt to masquerade have any presence and slip ago de...
Gun buying spiked during the outbreak. It’s still up. -- Baltimore Sun
The Northeastern as Harvard data come from every survey of 19, thousand people conducted in February. Researchers found that that is related to 6. 5% of U. S. adults bought marker pens in 2020, o...
Ebooks, books that mattered to me this winter - The Cancer Flex letter
Skip for navigation Skip to content Subscription Change Our change will be effective at once and your card will be recharged a prorated amount dependent upon your ex...
Okla CISO says pandemic quick zero-trust implementation - StateScoop
Written by Benjamin Freed Monton 30, 2021 | STATESCOOP With more than half of the Oklahoma state government’s request, 000-person workforce still working on their duties remotely in a year's...
Erik Prince: Q&A - Asia Times
Blackwater founder and former CEO Erik Prince recently spoke to Asia Times for a two-part, in-depth story: Part 1 can be read here; Part 2 can be read here. However, for the full convenience of read...
Nostalgia trip: Old Macs show how far we've come - PC World
When I started working for MacUser magazine in 1993, I was assigned to a gray cubicle with an old Mac IIci inside. (The summer intern didn't get the latest and greatest.) I don't know how that...
How to Watch the Olympics (With a VPN): Live Stream Tokyo Games 2021 - Cloudwards
Although a year late, the anachronistically named Tokyo 2020 Olympics are finally here. They’re the fourth Olympic Games held in Japan, but only the second Summer Olympics after Tokyo 1964. A lot of...

IP Rotating Proxy Onsale


First month free with coupon code FREE30