What is Proxy?
A server that acts as an intermediary between you and the internet. Your requests go to the proxy, which forwards them to the destination. Proxies can hide your IP, bypass geo-restrictions, or filter content—but the proxy operator sees your traffic.
Also known as: Proxy server, HTTP proxy, SOCKS proxy
A proxy stands between you and the rest of the internet. Whether that protects or exposes you depends on who runs it and whether traffic is encrypted.
How Proxies Work
- You configure your device or browser to use a proxy
- Your traffic goes to the proxy instead of directly to the destination
- The proxy forwards your request and returns the response
- To the destination, the request appears to come from the proxy's IP
Proxy Types
HTTP/HTTPS Proxy
- Handles web traffic
- Can see unencrypted HTTP (URLs, content)
- HTTPS: Proxy sees domain (SNI) but not full URL or content
- Common in corporate networks, schools
SOCKS Proxy
- Works with any TCP traffic (not just HTTP)
- Lower level—doesn't understand application protocol
- SOCKS5 supports authentication, UDP
Transparent Proxy
- Intercepts traffic without your configuration
- You may not know you're using one
- ISPs, corporate networks use for caching, filtering
Privacy Considerations
- Proxy sees everything (unless end-to-end encrypted): Choose trusted operators
- Free proxies: Often log and sell your data
- VPN vs. proxy: VPN encrypts your entire connection to the VPN server; proxy may not
- Tor: Uses a chain of proxies (relays) for stronger anonymity
- Single point of failure: Proxy operator can log, modify, or block traffic
Related Terms
IP Address
A unique numerical identifier assigned to every device connected to a computer network. Your IP address reveals your approximate geographic location and can be used to track your online activity, link your actions across websites, and identify your internet service provider.
Tor
The Onion Router—a free network that routes your traffic through multiple layers of encrypted relays. No single relay knows both your identity and your destination. Tor enables anonymous browsing, access to .onion sites, and censorship circumvention.
Virtual Private Network
A technology that creates a secure, encrypted connection over a less secure network, such as the public internet. VPNs mask your IP address, encrypt your internet traffic, and can make it appear as though you're browsing from a different location.
Have more questions?
Use our guided flow to get the right next privacy step for Proxy.
Open Guided Flow