• 강력한 마케팅 필수템!
    프로그램베이
  • 기획·제작·마케팅까지
    최고의 비즈니스 파트너
  • 트렌드를 넘는 마케팅!
    디지털 마케팅 플랫폼
공지사항
프록시와 VPN
작성자운영자
작성일2020-12-08
조회2,449

프록시, VPN차이


프록시와 VPN은 모두 먼 거리에 잇는 컴퓨터와 자신의 컴퓨터를이어주며, 보안성을 높여주는 역할을 하기도 합니다. 그 차이는 다음과 같습니다.

먼저, 프록시는 IP우회를통해 해외 사이트를 접속하는 등 사소한 목적을 위해 사용됩니다.
유투브나 웹사이트 등에서 지역제한을 걸어두는 경우가 있습니다.

IP주소는 특정 대역을특정 지역에 할댕해 놓앗는데, 이를 통해서 웹사이트 관리자나 서버 관리자가 특정IP대역을 차단해 놓으면, 그 IP를 사용하는 사람들은 그 사이트를 사용할 수 없게됩니다.

이때, 프록시 서버를 사용하게 되면, 프로시 서버가 우리의 요청을 대신 사이트에 요청해주고 응답 결과를 다시 우리에게 전달해 줍니다. 하지만 프록시 서버는 IP주소를 숨겨주기만 할 뿐, 데이터의 내용을 암호화하지는 않습니다.

반면, VPN은 전송내용을 암호화하며, 스누핑을 피하는 등 중대한 목적에 사용됩니다. VPN은 우리의 요청과 결과를 암호화한 뒤에 전달하기 때문에 중간에 다른 사용자가 데이터를 탈취해도 무슨 내용인지 알수가 없습니다. 그렇기 때문에 금융 거래를 할 때나 보안이 필요한 문서를 주고 받을 때는 프록시가 아닌 VPN을 사용하는 것이 안전합니다.

한줄요약.
1. 프록시는 중간에서 다른 서버가 요청과 응답을 대신 주고받아서 접속하는 컴퓨터의 IP주소를 숨길 수 있으나 데이터의 암호화를 수행하지 않는다.
2. VPN은 프록시와 다르게 데이터 암호화를수행하여 다른 사용자가 그 내용을 보아도 읽을 수가 없다.

 

 


 

 

What’s the Difference Between a VPN and a Proxy?

A proxy connects you to a remote computer and a VPN connects you to a remote computer so they must be, more or less, the same thing, right? Not exactly. Let’s look at when might you want to use each, and why proxies are a poor substitute for VPNs.

 

Selecting the Right Tool Is Critical

Practically every other week there’s a major news story about encryption, leaked data, snooping, or other digital privacy concerns. Many of these articles talk about the importance of beefing up the security of your Internet connection, like using a VPN (Virtual Private Network) when you’re on public coffee shop Wi-Fi, but they’re often light on the details. How exactly do the proxy servers and VPN connections we keep hearing about actually work? If you’re going to invest the time and energy in improving security you want to be sure you’re selecting the right tool for the right job.

Although they are fundamentally different, VPNs and proxies have a single thing in common: they both allow you to appear as if you are connecting to the internet from another location. How they accomplish this task and the degree to which they offer privacy, encryption, and other functions, however, varies wildly.

Proxies Hide Your IP Address

A proxy server is a server that acts as a middleman in the flow of your internet traffic, so that your internet activities appear to come from somewhere else. Let’s say for example you are physically located in New York City and you want to log into a website that is geographically restricted to only people located in the United Kingdom. You could connect to a proxy server located within the United Kingdom, then connect to that website. The traffic from your web browser would appear to originate from the remote computer and not your own.

Proxies are great for low-stakes tasks like watching region-restricted YouTube videos, bypassing simple content filters, or bypassing IP-based restrictions on services.

For example: Several people in our household play an online game where you get a daily in-game bonus for voting for the game server on a server ranking website. However, the ranking website has a one-vote-per-IP policy regardless of whether different player names are used. Thanks to proxy servers each person can log their vote and get the in-game bonus because each person’s web browser appears to be coming from a different IP address.

On the other side of things, proxy servers are not so great for high-stakes tasks. Proxy servers only hide your IP address and act as a dumb man-in-the-middle for your Internet traffic. They don’t encrypt your traffic between your computer and the proxy server, they don’t typically strip away identifying information from your transmissions beyond the simple IP swap, and there are no additional privacy or security considerations built in.

Anyone with access to the stream of data (your ISP, your government, a guy sniffing the Wi-Fi traffic at the airport, etc.) can snoop on your traffic. Further, certain exploits, like malicious Flash or JavaScript elements in your web browser, can reveal your true identity. This makes proxy servers unsuitable for serious tasks like preventing the operator of a malicious Wi-FI hotspot from stealing your data.

Finally, proxy server connections are configured on an application-by-application basis, not computer-wide. You don’t configure your entire computer to connect to the proxy–you configure your web browser, your BitTorrent client, or other proxy-compatible application. This is great if you just want a single application to connect to the proxy (like our aforementioned voting scheme) but not so great if you wish to redirect your entire internet connection.

The two most common proxy server protocols are HTTP and SOCKS.

HTTP Proxies

The oldest type of proxy server, HTTP proxies are designed expressly for web-based traffic. You plug the proxy server into your web browser’s configuration file (or use a browser extension if your browser doesn’t natively support proxies) and all your web traffic is routed through the remote proxy.

If you’re using an HTTP proxy to connect to any sort of sensitive service, like your email or bank, it is critical you use a browser with SSL enabled, and connect to a web site that supports SSL encryption. As we noted above, proxies do not encrypt any traffic, so the only encryption you get when using them is the encryption you provide yourself.

SOCKS Proxies

RELATED: How To Anonymize and Encrypt Your BitTorrent Traffic

The SOCKS proxy system is a useful extension of the HTTP proxy system in that SOCKS is indifferent to the type of traffic that passes through it.

Where HTTP proxies can only handle web traffic, a SOCKS server will simply pass along any traffic it gets, whether that traffic is for a web server, an FTP server, or BitTorrent client. In fact, in our article on securing your BitTorrent traffic, we recommend the use of BTGuard, an anonymizing SOCKS proxy service based out of Canada.

The downside to SOCKS proxies is that they are slower than pure HTTP proxies because they have more overhead and, like HTTP proxies, they offer no encryption beyond what you personally apply to the given connection.

How to Select a Proxy

When it comes to selecting a proxy, it pays to…well, pay. While the Internet is awash with thousands of free proxy servers, they are almost universally flaky with poor uptime. Those kind of services might be great for a one-off-task that takes a few minutes (and is not particularly sensitive in nature), but it’s really not worth relying on free proxies of unknown origin for anything more important than that. If you know what you’re getting into in terms of quality and privacy, you can find piles of free proxy servers at Proxy4Free, a well-established free-proxy database.

While there are stand-alone commercial services out there like aforementioned BTGuard,  the rise of faster computers and mobile devices coupled with faster connections (both of which reduce the impact of encryption overhead) the proxy has largely fallen out of favor as more and more people opt to use superior VPN solutions.

Virtual Private Networks Encrypt Your Connection

Virtual Private Networks, like proxies, make your traffic appear as if it comes from a remote IP address. But that’s where the similarities end. VPNs are set up at the operating system level, and the VPN connection captures the entire network connection of the device it is configured on. This means that unlike a proxy server, which simply acts as a man-in-the-middle server for a single application (like your web browser or BitTorrent client), VPNs will capture the traffic of every single application on your computer, from your web browser to your online games to even Windows Update running in the background.

Furthermore, this entire process is all passed through a heavily encrypted tunnel between your computer and the remote network. This makes a VPN connection the most ideal solution for any sort of high-stakes network use where privacy or security is a concern. With a VPN, neither your ISP nor any other snooping parties can access the transmission between your computer and the VPN server. If you were traveling in a foreign country, for example, and you were worried about logging into your financial web sites, email, or even connecting safely to your home network from afar, you could easily configure your laptop to use a VPN.

Even if you’re not currently on a business trip in rural Africa, you can still benefit from using a VPN. With a VPN enabled, you never have to worry about crappy Wi-Fi/network security practices at coffee shops or that the free internet at your hotel is full of security holes.

Although VPNs are fantastic, they are not without their downsides. What you get in whole-connection-encryption, you pay for in money and computing power. Running a VPN requires good hardware and, as such, good VPN services are not free (although some providers, like TunnelBear, do offer a very spartan free package). Expect to pay at least a few dollars a month for a robust VPN service like the solutions we recommend in our VPN guideStrongVPN and ExpressVPN.

RELATED: How to Choose the Best VPN Service for Your Needs

The other cost associated with VPN’s is performance. Proxy servers simply pass your information along. There is no bandwidth cost and only a little extra latency when you use them. VPN servers, on the other hand, chew up both processing power and bandwidth on account of the overhead introduced by the encryption protocols. The better the VPN protocol and the better the remote hardware, the less overhead there is.

The process of selecting a VPN is a bit more nuanced than selecting a free proxy server. If you’re in a hurry and you want a reliable VPN service that we both highly recommend and use ourselves on a daily basis, we’ll direct you towards Strong VPN as our VPN of choice. If you’d like to read a more in-depth look at VPN features and how to select one, we’d encourage you to check our detailed article on the subject.



In summary, proxies are great for hiding your identity during trivial tasks (like “sneaking” into another country to watch a sports match) but when it comes to more series tasks (like protecting yourself from snooping) you need a VPN.

이전글 소셜 미디어 최적화란?
다음글 Marketing Tip ▒ 카페디비 추출기 : 카페 타겟팅의 장점
×
본인인증 ×
본인인증이 불가하신 분들은
고객센터 1522-8045으로
연락주시기 바랍니다.
X
마케팅프로그램 전문 기업 프로그램베이 이용약관
전자금융거래 이용약관
수집하는 개인정보의 항목
개인정보의 수집 이용목적
키워드/주제별 문서생성 예시
키워드
키워드 = 업체명
Ex) 프로그램베이, 평화**뒷고기
주제
주제 = 업체에 대해 홍보하고 싶은 주제
Ex) 마케팅프로그램, 음식점
1