Kodeclik Blog
Proxy Servers and Firewalls
A proxy server and a firewall are both cybersecurity tools that protect a user's computer and network, but they differ in how they work and what they do.
What is a proxy?
Imagine you want to buy something from a store, but you're too shy to go yourself. So you ask your friend to go to the store for you. Your friend acts as a "proxy" - they go to the store on your behalf, buy what you need, and bring it back to you.
In computer networks, a proxy server works similarly. When you want to access a website, instead of connecting directly, your request goes to the proxy server first. The proxy then makes the request for you and brings back the website's content.
Why is a proxy server useful?
A proxy server is useful because it can hide your identity (the website being accessed will see the proxy's address, but not yours). For instance, if you live in an authoritarian country that blocks access to news websites, then a proxy server (which is likely situated in a friendlier country or even your same country) will make the request on your behalf and fetch the content for you.
It can also be useful when you are trying to access content that might be blocked in your location.
Finally, proxy servers are useful when you want to speed up access by caching content from popular websites.
Is a proxy the same as a VPN?
A VPN (or virtual private network) is a more elaborate, secure, encrypted tunnel for all your internet traffic, hiding your IP address and protecting your online activities. It covers all websites and applications on your device, offering stronger security features and often maintaining strict no-logs policies. VPNs generally provide better performance than free proxies, use secure protocols, and while usually paid services, they offer more comprehensive protection for sensitive online activities.
In short, VPNs are more elaborate, often paid services, and offer a comprehensive suite of features. For sensitive activities like online banking or when you need full encryption of your internet traffic, a VPN is the better choice.
What is TOR and how is it different from a VPN?
Tor (The Onion Router) is a very specific anonymous communication network. It consists of thousands of volunteer-operated servers (called relays or nodes) that form a decentralized network. This network uses onion routing to encrypt and route internet traffic, making it difficult to trace the origin of the data. Tor routes your traffic through multiple servers, encrypting it at each step, whereas a VPN typically routes your traffic through a single server operated by the VPN provider.
While Tor is a network, it also provides a browser (The Tor Browser) for people to access sites using it. This browser is a modified version of Firefox designed to protect user privacy and access the Tor network easily. The Tor Browser is the most common way for average users to interact with the Tor network.
What is a firewall?
Think of a firewall like a security guard at the entrance of your school. This guard checks everyone coming in and going out, making sure only authorized people enter and that nobody takes anything they shouldn't out of the school.
In computer terms, a firewall is a security system that monitors and controls network traffic. It acts as a barrier between your trusted internal network (like your home or school network) and untrusted external networks (like the internet).
Why is a firewall useful?
The firewall checks incoming and outgoing data. It allows or blocks traffic based on security rules and protects against unauthorized access and potential threats. Just like the school security guard might let students in but stop strangers, a firewall allows safe traffic while blocking potential threats or unauthorized access attempts.
Is there a situation where I will need to use a proxy, VPN, TOR, and a firewall together?
Yes! Imagine you're a journalist working on a sensitive story in a country with strict internet censorship and surveillance. You need to protect your identity, access blocked resources, and secure your communications. Here's how you might use each tool:
Proxy: You use a proxy server to access a news website that's blocked in your country. The proxy allows you to bypass the local content restrictions and view the site.
VPN: To protect all your internet traffic, you connect to a VPN. This encrypts your data and masks your real IP address, making it difficult for your ISP or government to monitor your online activities.
Tor: For maximum anonymity when communicating with sources or accessing highly sensitive information, you use the Tor browser. Tor's multi-layered encryption and node routing make it extremely difficult to trace your online activities back to you.
Firewall: On your computer, you have a personal firewall active. This helps protect your device from potential cyber attacks, unauthorized access attempts, and malware that might compromise your work or identity.
In this scenario, thus, the proxy helps you access blocked content; the VPN provides overall encryption and privacy for your internet connection; Tor offers the highest level of anonymity for the most sensitive tasks; and the firewall acts as a last line of defense to protect your local device.
By using these tools in combination, you create multiple layers of security and privacy, making it much more difficult for anyone to monitor, censor, or interfere with your online activities.
To learn more computing concepts, checkout our blogpost on git vs github vs gitlab.