How to Circumvent an Internet Proxy

Some governments and organizations employ proxy servers to filter web content, permitting access to some web sites while blocking others. Here are several ways to get around these censorship policies. For more information, go to "":

You will need

  • A computer with internet access
  • Technical skill
  • Appropriate software

Step 1 Understand the process Get a grasp of the basic process. A content-filtering proxy server controls access to web content. You can bypass these controls and view restricted pages by using circumvention technology, which creates an alternate path to your web destination. There are several types of circumvention methods, each with pros and cons.

Step 2 Try cached pages One simple technique is to try viewing “cached pages,” which are copies of original web pages a search engine has indexed. If a web site is blocked, click on the ‘cached’ link that usually appears beneath each search result. You’ll access the page through the search engine’s servers, not from the restricted web site itself. Caching services are blocked in some countries, however. Some sites also offer alternate domain names, which may escape internet filters.

Step 3 Connect to a public proxy Another way to get around restrictive policies is to connect to an open, public proxy server, which acts as a middleman between you and the content you request. Find one by searching for “open public proxy” online. Then, type its IP address into your browser’s network settings. When you request web content, you do so through this other server.

Step 4 Try a web-based circumvention service Another “middleman” option is a web-based circumvention service, a third-party web site that retrieves the page you’re trying to access and returns the content to you, bypassing the proxy. To anyone trying to view your internet traffic, it will appear that you’re only accessing the third-party web site. Find one by typing “web proxy” into a search engine. Once you’re on the circumventor site, enter the web address you want to access. Some web-based circumvention services are free, while others charge a fee. Make sure you investigate any costs before signing up.

Step 5 Investigate circumvention software A more thorough method is the use of either tunneling or anonymizing software. Both types carry a lower risk of being blocked or identified, but also tend to be more difficult to use without technical expertise. You will also likely need your own computer to download software, though some can run off a USB flash drive. Tunneling software encapsulates information through a secure connection, hiding your internet history. Anonymizing software generally routes traffic through a complex network that is extremely difficult to trace. By disguising traffic, both methods will help you reach an otherwise blocked site. Search online for “tunneling software” or “anonymizing software” for options.

Step 6 Change it up New circumvention techniques pop up all the time, and it can take a while before internet-filtering proxies discover and block them. You may need to alternate between different methods for the best results.