VPN vs Proxy Explained Pros and Cons

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 พ.ค. 2024
  • A VPN (virtual private network) and Proxy are two pieces of tech that each has their applications, differences and pros and cons. Both make requests on behave on the client but they are implemented very differently. In this video I want to go through the following:
    - What is a VPN?
    - How a VPN works?
    - VPN Pros and Cons
    - What is a Proxy?
    - How a Proxy works?
    - Proxy Pros and Cons
    Time Codes
    0:00 Intro
    1:10 What is a VPN
    9:56 Pros & Cons
    19:55 What is a Proxy?
    24:28 Proxy PRos & Cons
    Cards
    NAT 3:15
    OSI 5:10
    TCP Tunneling 5:40
    TLS 14:45
    Do you need a VPN 17:08
    TOR 27:54
    In a VPN, the client becomes part of a completely different network . So if a client makes a request to a server, the new network makes the request.
    A VPN makes a machine part of a nother network at the lowest level of the network (layer 2) you can a brand ip address a brand mac address.
    In A Proxy, the client makes the request to the proxy asking it to go to a destination server, and proxy makes the request to the server.
    VPN Pros
    - Encrypts traffic
    - Redirect all traffic at the lowest level (layer 2)
    - Access restricted content
    - Access Private networks (work)
    VPN Cons
    - Anonymity (uhmm)
    - Slow extra hops
    - Double Encryption
    - VPN can log your data (DNS)
    Proxy Pros
    - Caching Layer 7
    - Anonymity (double meh)
    - Blocking Websites (transparent proxy)
    - Control and many applications (load balancing, service mesh, firewall proxy security)
    - Work on Layer 7 and Layer 4
    Proxy Cons
    - Applications can bypass proxy
    - Not all traffic is routed. HTTP proxy, HTTPS proxy SOCKS proxy
    - No encryption by default
    Resources
    Resources
    Kazakhstan Government
    www.zdnet.com/article/kazakhs...
    networkengineering.stackexcha...
    🏭 Software Architecture Videos
    • Software Architecture
    💾 Database Engineering Videos
    • Database Engineering
    🛰 Network Engineering Videos
    • Network Engineering
    🏰 Load Balancing and Proxies Videos
    • Proxies
    🐘 Postgres Videos
    • PostgresSQL
    🧮 Programming Pattern Videos
    • Programming Patterns
    🛡 Web Security Videos
    • Web Security
    🦠 HTTP Videos
    • HTTP
    🐍 Python Videos
    • Python by Example
    🔆 Javascript Videos
    • Javascript by Example
    Support me on PayPal
    bit.ly/33ENps4
    Become a Patreon
    / hnasr
    Stay Awesome,
    Hussein
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 62

  • @corey.morreale
    @corey.morreale 4 ปีที่แล้ว +18

    The Bob Ross of networking :) "Beautiful Router, Beautiful IP Address" Love it.

  • @tubbalcain
    @tubbalcain 3 ปีที่แล้ว +19

    You deserve soooo much more subs, really underrated channel.

  • @sebschrader
    @sebschrader 3 ปีที่แล้ว +12

    To answer your question wrt DHCP and VPN: In most VPNs DHCP is not used and the VPN server (also called concentrator) allocates the IP from an internal pool (or obtains it via other means, e.g. RADIUS) and assigns it to the client via the VPN protocol itself together with other related information like routes, DNS resolvers, hostname etc.

    • @amdtv693
      @amdtv693 ปีที่แล้ว

      hey, thank you I was searching for this answer.

  • @firstnamelastname-ok3gf
    @firstnamelastname-ok3gf 3 ปีที่แล้ว +1

    i've been researching this topic and this so far has been the only one to give a genuine answer. the rest of the sources i visited were vague in vpns and proxies and didn't explain what the difference was, despite that being the point of the source. there's no propaganda here, just pure facts and i can respect that.

  • @oguzhantopaloglu9442
    @oguzhantopaloglu9442 ปีที่แล้ว

    Your channel is amazing, I learnt so much from you about TCP, UDP, VPN, proxies etc.

  • @carriereidm.2899
    @carriereidm.2899 4 ปีที่แล้ว +4

    Thanks so much! Very helpful. Love your videos, so easy to understand

    • @hnasr
      @hnasr  4 ปีที่แล้ว +1

      Carrie Reid M. Thank you Carrie 😊 appreciate your comment

  • @renanaoki714
    @renanaoki714 8 หลายเดือนก่อน

    Thanks! Very well explained!!!

  • @pablohernandez4305
    @pablohernandez4305 3 ปีที่แล้ว

    Thanks for this video it helped me a lot to understand the proxy

  • @ekejma
    @ekejma 3 ปีที่แล้ว

    Great content as usual.

  • @thearchibaldtuttle
    @thearchibaldtuttle 4 ปีที่แล้ว +3

    Good day and thank you!

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Archibald Tuttle have a great day and enjoy the video!

  • @khatritariq
    @khatritariq 4 ปีที่แล้ว +3

    Nicely explained.

    • @hnasr
      @hnasr  4 ปีที่แล้ว +1

      Thanks Tariq!

  • @ImAnonymous433
    @ImAnonymous433 2 ปีที่แล้ว +1

    your Explanation is in such a way that a student read a concept and have douts

  • @GuidoPerdomo
    @GuidoPerdomo 3 ปีที่แล้ว

    you know you explain concepts so well, in a funny and engaging way, but my favorite thing about you is how you roll the r's, I think it may cure cancer and bring world peace.

  • @devjohncarlo
    @devjohncarlo 2 ปีที่แล้ว

    your questions are the same to me, I'm also a software developer and I'm curious how to create a VPN from scratch so I made it using the C program but the IP I assign is static client and server I'm also not sure how it works about assigning IP in VPN.

  • @osmaninci672
    @osmaninci672 2 ปีที่แล้ว

    It was very Helpful Mr. Joker, I believe whatever doesn't kill u makes u a stranger.

  • @Louisrael
    @Louisrael 3 หลายเดือนก่อน

    Proxies are generally known for providing faster connection speeds than VPNs since they only direct specific traffic through their servers, whereas VPNs encrypt all internet traffic, potentially causing speed reductions. Zeus Proxy offers a rotating residential proxy, perfect for various activities like e-commerce multi-account registrations, data crawling, airdrops, and gaming.

  • @palaniappanrm6277
    @palaniappanrm6277 3 ปีที่แล้ว

    Another doubt wrt to Proxy. I understood about the load balancer, side car in service mesh are example of HTTP proxy so that they can see the data and route accordingly with layer 7 information. In HTTPS proxy, let's say we access @t, we encrypt that and again encrypt with TLS of the proxy server. Then how come Proxy server can read our data after first TLS decryption alone? They can't see anything beyond TCP packet network 4 right? They can just see the public IP of the google right?

  • @vaporwareproducts
    @vaporwareproducts 2 ปีที่แล้ว

    Do y’all recommend a vpn over a proxy for SoMe activity? I’ve heard that residential proxies are the best for avoiding banning. Hearing that if sites like FB see a VPN they will ban Acct/profile. Hogwash? I’m wanting to connect to distinct local SoMe profiles for interaction, etc. What do you recommend to remove session fingerprints from browsers or does that matter with VPNs (I’m ignorant) but know this is needed with proxies. Thx!

  • @jivanmainali1742
    @jivanmainali1742 3 ปีที่แล้ว

    So where is dns server located?It must be present with client

  • @apocalypseb7x
    @apocalypseb7x 2 ปีที่แล้ว

    Does VPN provides save your logs information? What do you think about that? I think is not the best choice for privacy

  • @jivanmainali1742
    @jivanmainali1742 3 ปีที่แล้ว

    How to get public IP for my home server??

  • @laanbarehamza1024
    @laanbarehamza1024 2 ปีที่แล้ว

    Does Proxychains on Kali Linux provides Anonymity ?

  • @shaitansinghmeena63.76
    @shaitansinghmeena63.76 ปีที่แล้ว +1

    Nice

  • @cybersecurity90
    @cybersecurity90 2 ปีที่แล้ว

    it can be better and it is very high level overview which is good for new engineers

  • @jasonhiggins.3853
    @jasonhiggins.3853 2 ปีที่แล้ว

    Hello, my PC IP address is blacklisted and i now when i try to run email campaigns they dont get into the recipients inboxes, this is real pain. My ISP wont give me a new IP either!! I have tried using a VPN as well but it does not work. Does anyone know of any solution to this apart from buying another PC which is not what i really want to do. Thanks.

  • @jivanmainali1742
    @jivanmainali1742 3 ปีที่แล้ว

    How router serves a static files when we type default gateway in browser ? So is there a server listening for port 80 and serves file

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Jivan Mainali correct, it is an http server module that serves that and help manage config

  • @krupakarreddy8235
    @krupakarreddy8235 3 ปีที่แล้ว +1

    Can we use both vpn server and proxy server..if yes in what way??

    • @hnasr
      @hnasr  3 ปีที่แล้ว +2

      Krupakar Reddy if you used VPN to login to your work private netwok and then using fiddler as proxy to debug your app thats an example where both VPN and proxy are used in the same time.

  • @LivingTheDream77
    @LivingTheDream77 3 ปีที่แล้ว

    What about https only proxy ?

  • @ImAnonymous433
    @ImAnonymous433 2 ปีที่แล้ว

    host router provide ip addresss because pc has not ability work as dhcp server

  • @poliIndia
    @poliIndia 3 ปีที่แล้ว +3

    Hussein explaining why other people using the VPN can access my data... "Just something to think about". Me, using VPN for netflix all the time, laughs in panic.

  • @FordExplorer-rm6ew
    @FordExplorer-rm6ew 4 ปีที่แล้ว +2

    Proxys seem abstract and hard to understand,
    At least what proxys are now.
    compared to the early 00s when I was a kid. Using them in school.
    How is this kind of proxy different from when we set a proxy for react or something like that?
    I feel like the term proxy, has been very obfuscated since the 00s

    • @hnasr
      @hnasr  4 ปีที่แล้ว +3

      Great question and I talk about those kind of proxies in the end of the videos such as react proxy and fiddler and charlie.. a proxy was designed for caching back in early 00s as you said but engineers discovered it can be used for so many other applications such as intercepting traffic, firewalls, http Accelerators , service mesh, microservices all that jazz.. it is rarely used now as annonymouzing service anymore way jump to 24:30 where i talk about those benefits of proxy..

    • @FordExplorer-rm6ew
      @FordExplorer-rm6ew 4 ปีที่แล้ว +2

      @@hnasr thanks man. this channel rocks : )

  • @NguyenNguyen-hh7lc
    @NguyenNguyen-hh7lc 4 ปีที่แล้ว +15

    The content could have been more precise, some parts were just to brag too much about the lack of anonymity of VPN and proxies. Instead, I would love to see how a proxy server terminates HTTPS requests from a client’s machine and forces the client’s machine to use HTTP so that it can view the request content

    • @hnasr
      @hnasr  4 ปีที่แล้ว +9

      Thanks Nguyen for your honest feedback. This video was designed to go through highlevel overview on both Proxy and VPN. Check out my deep dive on Proxies and TLS Terminations here
      HTTP Proxy deep dive
      th-cam.com/video/x4E4mbobGEc/w-d-xo.html
      TLS Termination
      th-cam.com/video/H0bkLsUe3no/w-d-xo.html

    • @NguyenNguyen-hh7lc
      @NguyenNguyen-hh7lc 4 ปีที่แล้ว +3

      Hussein Nasser Thanks for referring the links, will check them out soon. One more thing, if you’d like to emphasize the lack of anonymity in both cases, some dedicated slides or diagrams will bring up more impression to audiences than the word “meh” does. Looking forward to seeing improvement in your future videos.

    • @arrikd8358
      @arrikd8358 3 ปีที่แล้ว

      I read the comment section for comments like this.

    • @arrikd8358
      @arrikd8358 3 ปีที่แล้ว +1

      @@hnasr Kind of you to listen to critics and make a video about it .

  • @tubbalcain
    @tubbalcain 3 ปีที่แล้ว

    is becoming a part of the network (meaning giving full access to devices/servers and all the problems this can give) not only valid when your using-for example-IPsec IKEv2 VPNs, since these kind of VPNs work on a different OSI layer than the 'common' commercial TLS VPNs, who work on the applicationlayer (more or less between applicationlayer and transportlayer) and can be easily restricted, when talking about getting full access.
    Love to hear from you, my Guru 👳

  • @koki44443
    @koki44443 3 ปีที่แล้ว +2

    Dude u are so fucking funny. Love your stuff and it's well explained. I'm a developer, but still I believe the info to be accessible to most people.

  • @aatifbangash
    @aatifbangash 4 ปีที่แล้ว +1

    Must have youtube channel for the coders!!!.

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Hmmm not I am not sure if thats a good idea. It will spread me too thin.

  • @zee-x-eez9441
    @zee-x-eez9441 ปีที่แล้ว

    Kazakhstan is trying to catch Borat!!! ;-)

  • @qj1eo
    @qj1eo 2 ปีที่แล้ว +1

    i love y :(

  • @usamatahseenulhaque9125
    @usamatahseenulhaque9125 3 ปีที่แล้ว

    It was worth it

    • @highspparow3893
      @highspparow3893 ปีที่แล้ว

      That's what she said 😂
      Sorry I can't help it.

  • @sebschrader
    @sebschrader 3 ปีที่แล้ว

    IKE, IPSec, L2TP are _NOT_ Layer 2.

    • @sebschrader
      @sebschrader 3 ปีที่แล้ว

      And with most VPNs, the inside tunnel can only carry Layer 3 information and not Layer 2. With some VPNs you can chose, e.g. OpenVPN's tun mode vs tap mode, others like IPSec are Layer 3 by design and need to encapsulate other protocols like L2TP or GRE to carry L2 packets.

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Thanks for clarifying this!

  • @dhammi
    @dhammi 4 หลายเดือนก่อน

    26:06 🤣🤣

  • @sumitmodi5925
    @sumitmodi5925 ปีที่แล้ว +1

    Kripya mere mobile per add Dena band Karen

  • @umitkuluk3563
    @umitkuluk3563 3 ปีที่แล้ว

    🎍🏢

  • @biodevm
    @biodevm 2 ปีที่แล้ว

    The sound of the video is HORRIBLE!!!