I’ve been looking for a webproxy that would work with big websites like YouTube. So far I’ve found only very outdated and abandoned ones. Is there any up-to-date and actually functional webproxy I could host?
I’ve been looking for a webproxy that would work with big websites like YouTube. So far I’ve found only very outdated and abandoned ones. Is there any up-to-date and actually functional webproxy I could host?
What exactly do you mean by web proxy? Something like Invidious? An http proxy? A SOCKS5 proxy?
Close to invidious but not specific to any particular site. A page that allows to open other pages through it, like a browser inside a web page except it’s only for opening a website and has no other browser functionality. Here’s a proprietary example: croxyproxy.com
Why not run your own socks5 proxy server?
Yeah what you want is a SOCKS5 proxy.
Dante is what ive always used.
Ssh includes a built in socks proxy. What are you actually trying to accomplish?
Yeah you want the titanium networks projects.
I used to use Metallic.
These kinds of setups are used to bypass agressive network filtering and content censhorship. All the traffic is http(s). And then the way only a browser is needed means it works on locked down devices like chromebooks.
The browser in docker is something I have used, but it requires more resources to host and can only be used by one person at once if you are using something like linuxserver’s webtop.
Then EOCKS is what you want. It can be used on a Chromebook as well.
These proxying websites are running full browser instances in the background. It’s the only way to guarantee all the traffic is routed through it.
you can’t going wrong with squid. It was around forever, and still in development.
No, Socks5 does not work for this usecase. You don’t get permissions to run it locally via crostini and the settings are locked in the chromebook settings. In addition to this, it is too easy to fingerprint, and some of the more aggressive setups will catch it and block it. For example, my high school would autodetect wireguard and then kick you off of the network for 10 minutes if you attempted to connect.
I agree. It’s a bit tedious to configure, but rock solid and has all the features you could ask from a proxy.
Thanks! SOCKS5 proxy is a good option, I don’t know why I didn’t think of it from the very beginning…
My goal is to bypass local censorship on university computers that don’t allow running any executables except those provided by the administrator. And I’m trying to help professors who aren’t particularly tech-savvy, so a webproxy is actually still a better option.
That’s exactly what I need, thanks!
Thanks! I’ll look into it
I’m trying to find an alternative to VPN to be used on a locked up Windows device I can’t install any apps on. And it should be easy enough to be usable by non-tech-savvy people. @moonpiedumplings@programming.dev already provided a good solution
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:
| Fewer Letters | More Letters |
|---|---|
| HTTP | Hypertext Transfer Protocol, the Web |
| VPN | Virtual Private Network |
| VPS | Virtual Private Server (opposed to shared hosting) |
[Thread #155 for this comm, first seen 11th Mar 2026, 20:20] [FAQ] [Full list] [Contact] [Source code]
This ones been up-to-date since 1997
http://anonymouse.org/anonwww.html
I don’t think any other commenters know what you’re talking about.
If I’m understanding, this is like the old trick of using Google translate to bypass web blacklists.
But it won’t work for networks which implement whitelists.
Wow I used that to play miniclip games at school in like 2007 I can’t believe it still exists.
So, my high school used to have a domain/ip whitelist. The trick to get around whitelists is to take advandage of the fact that whole subdomains would be included in the whitelist, which would then also include any ip addresses.
Any duckdns subdomain, or anything hosted on many cloud providers would be unblocked.
So holy unblocker has a one click deploy, which can deploy to PaaS sites which would usually have their entire ip address space and subdomains included in the whitelist.
By the way: https://en.wikipedia.org/wiki/Shadow_IT
Sweet!
Wow, that’s pretty neat, thanks!