(Mar 1, 2018 06:01 AM)Yazata Wrote: (And no CC, I don't have the faintest clue what a 'proxy' is. The browser on my cellphone is whatever browser comes with Android.) Luckily I don't like posting to discussion boards with a phone because the screen's too small and the online keyboard is hard to use. I much prefer my laptop.
A proxy is a third-party point on the network that tunnels the connection between you and the site you are attempting to access. They can exist for multiple reasons;
It can be a part of how security measures are emplaced on networks where accessing content has to go through the proxy to be authenticated (and possibly tracked/digested), ISP's (especially phone networks) can use this method to aid in streamlining their services as the proxy can also be used as a cache to deal with high-traffic sites. (The advent of cloud networking however has reduced the necessity of this methodology considerably) proxies can be used to conceal the person accessing from the point they are attempting to access.
(This can be a bit of a security hole since its still a third-party that holds access to that transient information which is definitely something data brokers would operate to have a stranglehold over a persons "covert" data. e.g. Criminals feeding off of "criminals")
Proxies can also be used to circumnavigate censorship or blacklists(If such systems are using a straight forwards domain/ip filter having a different domain/IP allows circumnavigation. This isn't of course effective against DPI [Deep Packet Inspection] which when thwarting is where the realms of VPN's [Virtual Private Networks] and cryptology come into play.)
Sometimes, rarely there are viruses that computers can be infected with that will attempt to reroute your access to the net through a proxy (for the man in the middle attack), this can either be all your data accesses via the proxy entry in the browser or other viruses can just do a DNS poisoning or switch attack where the domains resolution service is hijacked so the sites you can end up loading up aren't the official sites you've come to know. (A number of companies involved in browsers have gone out of their way to try and make sure that their browsers identify such attacks, however it's still something that a decent anti-virus suite can keep from happening)
All in all they have their pro's and con's (both pro's and con's use them

)