Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. Already on GitHub? Sign in to your account. Recently, Iran and China's firewalls detect Outline VPN protocol then IP address of the server will be blocked after a while it depends on volume of traffic between Clients and server.
Proxies and Virtual Private Networks (VPNs)
Where would you like to share this to?
Proxies and VPNs differ in nature, although they can provide some of the same services. A VPN routes all of the network traffic on a client computer through a tunnel to some other server computer. No individual application configuration is required. In contrast, using a proxy requires each application to be individually configured to ensure its traffic goes through the proxy. The intent of a VPN is to allow a remote client computer to access network resources in some other location as if it were physically located in the same office. One of those network resources can be access to the internet, which masks the IP address of the remote computer. A proxy is more limited in that it cannot provide access to remote resources, but it can mask your IP address and provide geo-obfuscation services.
Types of proxies
Get the latest tutorials on SysAdmin and open source topics. Hub for Good Supporting each other to make an impact. Write for DigitalOcean You get paid, we donate to tech non-profits. It gives you the freedom to access the internet safely and securely from your smartphone or laptop when connected to an untrusted network, like the WiFi at a hotel or coffee shop.
Updated Wednesday, October 7, , by Andrew Lescher. Shadowsocks is a lightweight SOCKS5 web proxy tool primarily utilized to bypass network censorship and blocking on certain websites and web protocols. A full setup requires a Linode server to host the Shadowsocks daemon, and a client installed on PC, Mac, Linux, or a mobile device. Unlike other proxy software, Shadowsocks traffic is designed to be both indiscernible from other traffic to third-party monitoring tools, and also able to disguise itself as a normal direct connection.