VPN VS Proxy

A proxy and VPN connect you to a remote computer by same way? not exactly

 let's look at when might you want to use each, and why proxies are a poor subsitute for VPNs

Selecting the Right Tool is Critical

Practically, there is a mojor news story about encryption, leak data, snooping, or other digital privacy concerns. many article talk about the importance of beefing up the security of your internet connection,like using VPN(virtual private Network) when you're on public coffee shop Wi-Fi, but they're not light on the details. If you want to improve security and to be sure you're  selecting the right tool for the right job, please invest you time and energy for understanding the difference of VPN and proxy service.

 Although they are fundamentally differently, VPNs and proxies have a single thing in common: they both allow you to appear as if you are connecting to the internet from another location. How thery accomplish this task and degree to which they offer privacy, encryption, and other functions, however, varias widly.

Proxies Hide Your IP Adress

A proxy server that acts as a middleman in the flow of your internet traffic. you can log into a website that is geographically restricted by connet to a proxy server located in thar restricted area and connect to that website. Proxies are great for low-stakes tasks like watching region-restrict youTube videos, bypassing simple content filers, or bypassing IP-based restriction on services. Example: one-vote-one-IP can be fooled used proxies because each person's web browser appear to be coming form a different IP address. On the other side of things, proxy servers are not so great for high-stakes tasks. they don't typically strip away identifying information from your transmissions beyond the simple IP swap, and there are no addtional privacy or security considerations build in.

anyone with access to the stream of data can snoop on your traffic. Futher, certain exploits, like malicious Flash or JavaScript element. this makes proxy servers unsuitalble for serious takes like preventing the operator of a milicious Wi-Fi hospots from stealing your data.

Finally, proxy server connections are configured on an application-by-application basis, not computer-wide.  The two most common proxy server protocals are HTTP and SOCKS.

HTTP Proxies

the oldest type of server , HTTP proxies are designed expressly for web-based traffic. you plug the proxy server into your web broswer's configeration file(or use a brower extension if your brower doesn't natively support proxies) and all your web traffic is routed through the remote proxy. if you're using an HTTP proxy to connect to any sort of sensitive service, like your email or bank, it is critical you use a brower with SSL enabled, and connect to a web site that supports SSL encryption, as we noted above , Proxies do not encrypt any traffic, so the only encryption you get when using them is the encryption you provide yourself.

SOCKS Proxies

The SOCKS proxy system is a useful extension of the HTTP proxy system in that SOCKS is indifferent to the type of traffic that passes through it.

Where HTTP proxies can only handle web traffic, a SOCKS server will simply pass along any traffic it gets, whether that traffic is for a web server, an FTP server, or BitTorrent client. In fact, in our article on securing your BitTorrent traffic, we recommend the use of BTGuard, an anonymizing SOCKS proxy service based out of Canada.

How to Select a Proxy

When it comes to selecting a proxy, it pays to…well, pay. While the Internet is awash with thousands of free proxy servers, they are almost universally flaky with poor uptime. Those kind of services might be great for a one-off-task that takes a few minutes (and is not particularly sensitive in nature), but it’s really not worth relying on free proxies of unknown origin for anything more important than that. If you know what you’re getting into in terms of quality and privacy, you can find piles of free proxy servers at Proxy4Free, a well-established free-proxy database.

While there are stand-alone commercial services out there like aforementioned BTGuard,  the rise of faster computers and mobile devices coupled with faster connections (both of which reduce the impact of encryption overhead) the proxy has largely fallen out of favor as more and more people opt to use superior VPN solutions.

Virtual Private Networks Encrypt Your Connection

Virtual Private Networks, like proxies, make your traffic appear as if it comes from a remote IP address. But that’s where the similarities end. VPNs are set up at the operating system level, and the VPN connection captures the entire network connection of the device it is configured on. This means that unlike a proxy server, which simply acts as a man-in-the-middle server for a single application (like your web browser or BitTorrent client), VPNs will capture the traffic of every single application on your computer, from your web browser to your online games to even Windows Update running in the background.

Furthermore, this entire process is all passed through a heavily encrypted tunnel between your computer and the remote network. This makes a VPN connection the most ideal solution for any sort of high-stakes network use where privacy or security is a concern. With a VPN, neither your ISP nor any other snooping parties can access the transmission between your computer and the VPN server. If you were traveling in a foreign country, for example, and you were worried about logging into your financial web sites, email, or even connecting safely to your home network from afar, you could easily configure your laptop to use a VPN.

Even if you’re not currently on a business trip in rural Africa, you can still benefit from using a VPN. With a VPN enabled, you never have to worry about crappy Wi-Fi/network security practices at coffee shops or that the free internet at your hotel is full of security holes.

Although VPNs are fantastic, they are not without their downsides. What you get in whole-connection-encryption, you pay for in money and computing power. Running a VPN requires good hardware and, as such, good VPN services are not free (although some providers, like TunnelBear, do offer a very spartan free package). Expect to pay at least a few dollars a month for a robust VPN service like the solutions we recommend in our VPN guideStrongVPN and ExpressVPN.

The other cost associated with VPN’s is performance. Proxy servers simply pass your information along. There is no bandwidth cost and only a little extra latency when you use them. VPN servers, on the other hand, chew up both processing power and bandwidth on account of the overhead introduced by the encryption protocols. The better the VPN protocol and the better the remote hardware, the less overhead there is.

The process of selecting a VPN is a bit more nuanced than selecting a free proxy server. If you’re in a hurry and you want a reliable VPN service that we both highly recommend and use ourselves on a daily basis, we’ll direct you towards Strong VPN as our VPN of choice. If you’d like to read a more in-depth look at VPN features and how to select one, we’d encourage you to check our detailed article on the subject.

In summary, proxies are great for hiding your identity during trivial tasks (like “sneaking” into another country to watch a sports match) but when it comes to more series tasks (like protecting yourself from snooping) you need a VPN.

猜你喜欢

转载自blog.csdn.net/Tzureprograry/article/details/86571394
VPN