What is the difference between a proxy and a VPN?

A proxy is any server that sits between your device and a wider network, such as the internet. A virtual private network (VPN) server is a specific kind of proxy, but many other kinds of proxy exist. Although inaccurate (and as a result, confusing), VPNs are often contrasted to proxies. 

Learn more about what a VPN is(new window)

In this article, we look at what a proxy is and provide an overview of the different kinds of proxy that are available. 

What is a proxy?

As noted above, a proxy is a server that sits between your device and the internet. This means that your internet traffic passes through the proxy server and enters the internet using its IP address and physical location. Therefore, all proxies:

  • Hide your real IP address from websites (and other internet resources, such as games servers, BitTorrent peers, and email servers) you visit on the internet
  • Can be used to “spoof” your real geographic location

The connection between your computer and a proxy server is not always secured using encryption, but it often is. If a connection is encrypted:

  • Your internet service provider (ISP) cannot see what you do on the internet. It can only see that you have connected to a proxy server.
  • It also can’t see the contents of your internet traffic (for example, files you are downloading).

Most importantly, since your traffic passes through and is encrypted and decrypted by the proxy server, whoever runs the proxy server can monitor your internet activity. This is why it is crucial that you only use a trustworthy VPN(new window) to access the internet.

Technically speaking, this describes a forward proxy that sits between your computer and the internet. A reverse proxy, on the other hand, acts as a gateway between the internet and a small group of servers. The classic example of a reverse proxy is an office intranet that can only be accessed from the outside via a single (reverse proxy) server.

All the proxies discussed in the rest of this article are forward proxies.

VPNs vs. (other kinds of) proxies

If you are familiar with how VPNs work, this may all sound very familiar. The key differences between a VPN and most other kinds of encrypted proxy setups are:

  • A VPN protects your entire internet connection, while most proxies must be configured on a per-app basis (for example, your browser or BitTorrent client).
  • VPNs use highly secure VPN protocols(new window), such as OpenVPN and WireGuard, that provide additional layers of security for your data rather than just the simple HTTPS used to secure most proxy connections. 
  • VPN providers are commercial entities, often subject to a great deal of public scrutiny. VPN companies, such as Proton, spend a great deal of time and money building large and highly secure network infrastructure and developing advanced features for their community.

Learn more about how VPNs work(new window)

As discussed below, commercial (non-VPN) proxy services do exist, but the advantages of VPN technology over regular HTTP and SOCKS proxy setups mean this sector is far less developed (and therefore also far less open to scrutiny) than the VPN industry. 

Types of proxy

There are many different types of proxy servers. When people refer simply to a proxy or proxy server without additional context, they usually mean a SOCKS or HTTP proxy. 

SOCKS proxy

SOCKS is a low-level internet protocol that does not interpret internet traffic. That is, it simply passes along all traffic without making any attempt to understand what it is. This makes it useful for simply forwarding all kinds of internet traffic, including traffic that uses protocols, such as:

  • File Transfer Protocol (FTP)
  • POP3 and SMTP (used for sending and receiving emails)
  • Internet Relay Chat (IRC)
  • BitTorrent

SOCKS’s ability to proxy BitTorrent traffic, in particular, is a popular reason to use SOCKS proxies, and they are sometimes known as “torrent proxies”. Together with the high bandwidth often consumed while torrenting, public SOCKS proxies can often suffer from a high server load.

Support for HTTPS is built into the SOCKS protocol, and it is often used to secure connections to SOCKS proxy servers. 

SOCKS4 remains the most common version of SOCKS used by proxy servers, but SOCKS5 is the latest version. It provides proxy operators various ways to authenticate users, thus giving them greater control over who uses the server. Commercial proxy servers, for example, can use SOCKS5 to ensure only paying customers can connect to their servers. The benefits for people using SOCKS5 proxies, however, are minimal. 

HTTP proxy

The Hypertext Transfer Protocol (HTTP) links websites and other resources on the World Wide Web. HTTP proxies are supported by a very wide range of apps and programs that use the HTTP protocol, most notably browsers. 

Although reliance on the HTTP protocol limits HTTP proxies to a certain extent, it also allows them to operate at a higher level. This means they understand and interpret web traffic, which is useful for things such as:

  • Filtering web content (for example, removing banners and unnecessary, or even dangerous, scripts)
  • Restricting access to websites and other internet resources (for example, adult content)
  • Caching media and content for improved performance

It also allows the proxy to do things that many people might be less happy about, such as:

  • Censoring web content (for example, political content)
  • Injecting advertising banners and malicious code — this is a particular problem with free HTTP proxy servers

HTTP connections are not secure by default, allowing your ISP and other third parties to monitor your internet traffic. However, connections can be encrypted using the HTTPS protocol that secures all internet traffic. HTTP proxy servers that use HTTPS to secure your connection to the proxy server are often called HTTPS proxies

Web proxy

A web proxy is an HTTP proxy that you connect to inside your browser window without the need to download any software or configure your browser’s proxy settings. Most are free, but this is usually a downside, as many fund themselves by injecting banners, ads, and other (potentially malicious) scripts into your browser window.

Indeed, many web proxies disrupt your browsing experience to the extent that they make the internet all but unusable.

Transparent proxy

Transparent proxies sit between your device and the internet but are not something you deliberately connect to. In fact, you may not even know you are using one.

Benign uses of transparent proxies include the WiFi portals you sign in to on public WiFi hotspots and the filters that block inappropriate content on the WiFi provided by public libraries or schools. Less savory uses include censoring legitimate content for political, social, or religious reasons.

Proxy URL

A proxy URL is not a true proxy but a web address that forwards to another URL. It can be useful for evading censorship when a URL is blocked. 

Tor

The Tor anonymity network routes connections through multiple nodes, encrypting the connection each time. Each node acts as a proxy server and is run (at least in theory(new window)) by volunteers.

Private proxy

A private (or closed) proxy is any privately run proxy server that is not available to the public. Probably the most common example is a reverse proxy used by a company to act as a gateway to internal corporate resources, but it is also quite common for individuals to set up remote private proxy servers (which may be VPNs) to bypass censorship. 

However, it is worth noting that such personal proxies and VPNs are not as good at protecting your privacy as commercial VPN services because ownership of the proxy server’s IP address can be easily traced back to you.  

Commercial proxy

A commercial proxy (as distinct from VPN) is a paid-for service that allows you to connect to  HTTP or SOCKS proxies run by a company. These connections are almost always secured using HTTPS. 

Most commercial proxies run out of data centers, although commercial proxy services offering residential or mobile IP addresses are an emerging industry.

Commercial proxies are often categorized based on the amount of privacy they offer:

  • Shared – A proxy server (and associated IP address) that is shared with many other customers.
  • Semi-shared – A proxy shared with a limited number of other customers (typically three others).
  • Exclusive or dedicated – You have exclusive use of the proxy and its associated (static) IP address, although it’s worth noting that almost always means a virtualized server hosted on a physical machine that hosts many such virtual servers. It’s also worth noting that having an exclusive IP reduces privacy since the IP address can be traced back to you. 

Residential and mobile proxies

Most commercial proxies are operated out of data centers and use IP addresses that have been leased from an ISP. These blocks of data center-controlled IPs are sometimes blocked (a popular tactic used by streaming services that geo-restrict their content for copyright reasons).

Residential proxies are operated directly by ISPs, and therefore use IP addresses that are indistinguishable from “real” IP addresses that belong to physical addresses. They are therefore almost impossible to block and provide a higher level of granularity when using a proxy to spoof your location.

Mobile proxies are much like residential proxies, except they are offered by mobile internet providers.  

Public proxy

A public proxy is available for anyone to use for free. Lists of public proxies are freely available on the internet, but we strongly recommend against using them. 

This is because there is no way to know who is running the server and no reason to trust them. Indeed, since they can spy on everything you do online when connected to the server while asking for nothing in return for the time and effort required to run a proxy server, there is every reason to be suspicious. 

Public proxies are usually rated according to their anonymity level.

  • Level 1 (transparent proxy or caching proxy) – Not to be confused with the kind of transparent proxy discussed earlier in this article, these proxies will minimally hide your IP address. However, it still appears in the request header sent when connecting to web pages. Providing no effective privacy on the internet, level-1 proxies are mainly used to improve web performance by caching content.
  • Level 2 (anonymous proxy) – This type of proxy provides some privacy on the internet by hiding your real IP address from the websites you visit. However, they make no attempt to hide the fact that you are using a proxy server. It is common practice for proxy servers to announce themselves as proxy servers by using FORWARDED headers when making page requests.
  • Level 3 (elite proxy or high-anonymity proxy) – A level-3 proxy not only hides your real IP address but won’t announce the fact that you are using a proxy to websites you visit. Level-3 public proxies tend to be very popular, which can also make them very slow. 

Why you should use a VPN

As we have discussed, there are many different types of proxy. VPNs and commercial proxies are similar in many ways and are often used to achieve similar ends. However, there are good reasons why the VPN market is so much bigger and more developed than the commercial proxy market.

The choice, of course, is yours. 

Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Protect your privacy and security online
Get Proton VPN free

Related articles

What is AirTag stalking?
In an era of “smart devices” that often double as spy devices, AirTags are tracking tools that are open about their function and can be vital in helping locate lost items (as anyone who has lost their car keys can attest to). However, as a recent cla
How to fix a "Your connection is not safe" error
As you surf the web using your browser, you’ll no doubt encounter websites that your browser will refuse to load, instead showing some variation of an error message, such as Your connection is not private or Warning: Potential Security Risk Ahead. 
Your search history is a window into your inner life. Anyone with access to it knows what your hobbies and interests are, your sexual orientation and preferences, the things that worry you (for example your medical concerns), your political affiliati
how to flush dns blog
  • Privacy deep dives
A DNS cache is a record of all the websites you’ve visited over a set amount of time. Simply put, your DNS cache is a list of websites you visited in the past that’s stored on your device. Your computer uses it to speed up visits to those same websit
Is Temu legit?
  • Privacy basics
Temu has become an unavoidable brand. Unknown to most up to a year ago, the online retailer exploded onto the digital scene in the United States with lavish ads and a riveting social media campaign, and has started its takeover in Europe now, too. As
We examIne whether the controversial Chinese video platform is safe to use
  • Privacy basics
In this article, we take an in-depth look at whether the wildly popular social media platform TikTok is safe to use. Several countries recently banned government officials from using TikTok, and now the US House of Representatives has passed the Pro