Proxy and VPN: Solution to Access Telegram, Medium, Steam and Protect Information
Author: Administrator
Published On: 26 May 2025
Proxy and VPN: Solutions for Accessing Blocked ISPs and Protecting Online Information
Many Internet users today may find themselves unable to access some popular services such as the messaging app Tele… , the blogging platform Medium , or Steam and other websites due to their restricted access in certain regions. To solve this problem and at the same time enhance the protection of personal information online, two commonly mentioned tools are Proxy servers and Virtual Private Networks ( VPNs ). This article will help you understand how they work, the differences, and how you can use them to overcome access barriers and protect your data.
I. What is a Proxy Server?
Think of a Proxy server as a middleman. When you want to send a request to the Internet, instead of sending it directly, you send it through this middleman.
1. Definition and how it works
A Proxy server is a computer that acts as a bridge between your device (like your computer, phone) and the Internet. When you use a Proxy, your web request will be sent to the Proxy server first. The Proxy server will then send this request to the website you want to view on your behalf. When the website responds, it will send it back to the Proxy server, and the Proxy will forward that information back to you.
Importantly, the website you visit will see the Proxy server's IP address, not your real IP address. This helps hide your original IP address.
For example: You are in Vietnam (with IP address A) and want to access a news website that only allows users in the US. You connect through a Proxy server in the US (with IP address B). Your request goes from IP A to IP B. The Proxy server (IP B) sends the request to the news website. The news website sees the request from IP B (US) so it allows access and sends data to IP B. IP B then forwards that data to you (IP A). The news website does not know about the existence of IP A.
2. Common types of Proxies
There are different types of Proxies, each with its own purpose:
HTTP Proxy: This is the most popular type, mainly used for web surfing (access via HTTP and HTTPS protocols). They are often used to access blocked websites or to temporarily store (caching) web content, helping to load pages faster next time.
SOCKS Proxy (Socket Secure): This type is more versatile than HTTP Proxy. SOCKS5 is the latest and most popular version, which can handle many types of Internet connections, not only web but also email, file downloads (torrents), online games, and importantly, messaging applications like Telegram. SOCKS5 often supports user authentication, which is a bit more secure than a simple HTTP Proxy.
Transparent Proxy: Users are often unaware that they are using this type of Proxy. They are often used by companies, schools, or Internet Service Providers (ISPs) to filter content or increase access speed.
Anonymous Proxy: This type helps hide your IP address.
3. Proxy's advantages
Hide IP address.
Access region-blocked content (e.g. websites, services like Medium).
Can be configured for specific applications (e.g. only for Telegram, or only for web browsers).
Cost: There are many free or cheap Proxies.
4. Limitations of Proxy
Low security: Most proxies (especially free ones) do not encrypt your connection. Your data can be eavesdropped on by others.
Risks from Untrusted Proxies: Free proxies can be unsafe, may log your activity.
Speed is unstable and can be slow.
Finding and configuring a good Proxy can be time consuming.
II. What is a Virtual Private Network (VPN)?
If a Proxy is like asking someone else to deliver your mail for you, a VPN is like putting your mail in a locked box and sending it through a special delivery service. Only the person with the key can open the mail.
1. Definition and how it works
A VPN creates a secure, encrypted connection, like a “private tunnel,” between your device and a remote server managed by the VPN provider. All internet data from your device (web browsing, email, apps like Telegram, etc.) passes through this encrypted tunnel.
As your data passes through this tunnel:
Encryption: Data is encrypted using security methods before leaving your computer.
Encapsulation: Encrypted data is “encapsulated” for sending to the VPN server.
VPN Server: At the VPN server, the data is decrypted and sent to its destination on the Internet. The VPN server's IP address replaces your real IP.
Response: Data from the Internet is sent to the VPN server, re-encrypted, and sent back to your computer through a secure tunnel.
This way, your ISP will only see that you're connected to the VPN server, but won't know what you're doing specifically. The websites and services you visit will see the VPN server's IP address.
2. Advantages of VPN
High Security: VPNs use strong encryption protocols to protect your entire Internet connection.
Good privacy protection: VPN hides real IP and encrypts data.
Access blocked content and bypass censorship effectively (including Telegram, Medium and many other services).
Works for all devices: When VPN is on, it protects every Internet connection from your device.
Safe file downloading (P2P/torrent).
3. Limitations of VPN
Cost: Good VPNs usually cost money. Free VPNs often have limitations and security risks.
Speed may be slightly slower due to encryption.
Trust your VPN provider (choose one with a "no-logs" policy).
III. Comparison of Proxy and VPN
The table below compares the key points between Proxy and VPN:
Usually not (SOCKS5 can support it but not all connections).
Yes , encrypt the entire connection.
Scope of operation
Per app (e.g. just browser or Telegram).
All devices (all Internet connections).
Security level
Low to medium.
High.
Privacy level
Medium. Proxy master can log activity.
High (if you choose a good supplier).
Visit Telegram/Medium
Maybe, need to configure SOCKS5 Proxy for Telegram, HTTP/S Proxy for browser to access Medium. Stability depends on Proxy.
More efficient, stable and secure. Turn on VPN and use it normally.
Expense
Many options are free, or cheap.
Usually a paid service.
IV. How to Use Proxy and VPN to Access Blocked Services (Example: Tele, Medium)
When you can't access services like Tele or Medium, both Proxy and VPN can be solutions. However, the methods and effectiveness will be different.
1. Use Proxy
To access Telegram:
The Telegram app (Desktop and some mobile versions) allows you to configure SOCKS5 Proxy directly in Settings -> Data and Storage -> Proxy Settings.
You will need to find the information of a SOCKS5 Proxy server (IP address, port, and possibly username/password if the Proxy requires it). There are many free Proxy providers online, but they are often unstable and can be unsafe. Paid Proxies are usually better.
Advantage: Only Telegram traffic goes through the Proxy.
Cons: Hard to find good Proxies, slow speeds, doesn't strongly encrypt your message content on the way to the Proxy server.
To access Medium (or other blocked websites):
You can configure HTTP/HTTPS Proxy in the network settings of your web browser (Chrome, Firefox,...). Or use Proxy extensions for your browser.
All requests from your browser will then go through the selected Proxy server, allowing you to access Medium.
Cons: Similar to Telegram, free Proxies are often unreliable. HTTP traffic is not encrypted over the Proxy.
When to Consider Proxy: When you need a quick, temporary solution, and aren't too concerned about the highest level of security for that task.
2. Use a VPN
This is often a more comprehensive, secure and stable solution.
How to do:
Sign up for a reputable VPN service (usually paid for good quality and high security).
Download and install that provider's VPN app on your device (computer, phone).
Open the VPN app, choose a server in a country where Telegram and Medium are not blocked (e.g. Singapore, USA, European countries...).
Connect to that server.
Once you've successfully connected to the VPN, you can open Telegram or access Medium (and other services) as usual. Your entire internet connection is now encrypted and going through the VPN server.
Advantage:
High security due to full traffic encryption. Safe for Telegram message content as well.
Easier to use after initial setup (just turn on/off).
Usually stable and has better speed than free Proxies.
Protect all apps on your device, not just Telegram or the browser.
When to use a VPN: When you prioritize security and privacy, need stable and long-term access to blocked services, or frequently use public Wi-Fi.
Remember: Whether you use a Proxy or a VPN, be cautious. Free proxies may collect your data. Free VPNs also have many limitations and risks. If possible, prioritize reputable paid VPN services with clear no-logs policies.
V. Summary
Both Proxies and VPNs are useful tools to help you bypass Internet restrictions and increase your privacy. To access blocked services like Telegram or Medium, Proxies can be a quick solution but are less secure and stable. VPNs offer a more robust solution that encrypts your entire connection, providing greater security and stability, which is especially important for privacy-sensitive messaging apps like Telegram.
Understanding the differences and how they work will help you choose the right tool for your needs. Protecting personal information and freedom of access to information online is essential in today's digital age.