The Gateway the World Can't Stop Searching For
Every month, 68 million people type the word "proxy" into a search bar. Most of those queries do not come from network engineers configuring enterprise firewalls. They come from students in Tehran trying to access Instagram, activists in Minsk seeking encrypted messaging, professionals in Shanghai looking for Google Docs, and teenagers in school libraries trying to reach YouTube.
A proxy is technically a server that acts as an intermediary between a user's device and the internet β routing traffic through a different IP address to conceal the user's origin or bypass geographic restrictions. But in practice, "proxy" has become a mass-market term for something more fundamental: the desire to access an internet that someone else has decided you should not be able to reach.
The volume of proxy-related searches β 68 million monthly, making it one of the highest-intent technical searches in the world β is not primarily a signal of IT demand. It is a demand signal for freedom. The shape of those searches, and the $137 billion industry that has grown to meet them, reveals one of the defining tensions of the digital era: the contest between states that want to control information and citizens and businesses that want to move freely through it.
What 68 Million People Are Actually Looking For
Proxy searches cluster around several distinct use cases, each with different motivations, risk profiles, and industries serving them.
The largest category is censorship circumvention. In countries where governments block social media platforms, news sites, or communication tools, proxy and VPN searches spike every time a restriction is imposed. When India banned TikTok in 2020, VPN downloads increased by 485% in 24 hours, according to AppMagic. When Iran blocked Instagram and WhatsApp during protests following Mahsa Amini's death in September 2022, the circumvention tool Psiphon reported its Iranian user base climbing from roughly 7,000 daily users to over 2 million within 72 hours.
The second category is workplace and school filtering bypass. A majority of educational institutions and large corporations operate content-filtering proxies that block social media, streaming services, and gaming sites. Students searching for "proxy" are often looking for simple web-based proxies that let them access blocked content during school hours β a phenomenon so widespread that "unblocked games" and "proxy for school" are among the top associated long-tail queries.
The third is commercial and professional use: web scraping services that route requests through rotating proxy pools to avoid rate limiting, price comparison engines that use residential proxies to check regional pricing, cybersecurity teams that use proxies for penetration testing, and advertisers who verify that their campaigns display correctly in different geographies.
Each of these populations is searching for the same word, but they inhabit entirely different economic and legal landscapes.
The Architecture of Restriction: Who Blocks What, and Why
The demand for proxies exists because a significant portion of the world's population lives behind internet restrictions that are more comprehensive than most Westerners realize.
China's Great Firewall is the most extensive national internet filtering system in existence. Formally known as the Golden Shield Project, it blocks Google, YouTube, Facebook, Instagram, Twitter/X, WhatsApp, most major Western news outlets, Wikipedia (intermittently), and thousands of other domains. The system employs a combination of IP blocking, DNS poisoning, deep packet inspection, and URL filtering β maintained by a workforce estimated at 2 million people, according to research by the Oxford Internet Institute.
The effect is not symbolic. China's 1 billion internet users operate on a parallel internet dominated by domestic platforms: Baidu instead of Google, WeChat instead of WhatsApp, Weibo instead of Twitter, Bilibili instead of YouTube. Foreign companies that want to operate in China must comply with content removal requests and data localization rules β a condition that many Western tech firms accepted until geopolitical pressures made continued compliance untenable. The Great Firewall created an alternative digital economy worth trillions; it also created 1 billion people with a structural reason to search for proxies.
Russia passed its "Sovereign Internet" law (RuNet) in 2019, giving the state authority to disconnect Russia from the global internet entirely and route domestic traffic through state-controlled infrastructure. The law has been used incrementally: Twitter/X was slowed and then blocked in 2022 following the invasion of Ukraine; Meta platforms (Facebook and Instagram) were designated "extremist organizations" and blocked. By 2023, VPN downloads in Russia had increased more than 2,200% from pre-war levels, according to data from analytics firm Sensor Tower.
Iran operates one of the world's most restrictive internet regimes, with persistent blocks on most social platforms, Google Play Store, and many foreign news sites. The government has also demonstrated willingness to impose near-total internet shutdowns during periods of civil unrest β a tactic that renders conventional proxy tools ineffective when the underlying connectivity is severed.
Turkey, Pakistan, Belarus, and Ethiopia all employ significant filtering regimes. Turkey has blocked Twitter/X at least twice β briefly in 2022 after a bombing and again in 2023 following the KahramanmaraΕ earthquake, citing concerns about misinformation. Pakistan banned Twitter/X for months in 2024 amid political unrest and has intermittently blocked Wikipedia. The pattern across all these cases is similar: restriction escalates during political crisis, proxy use spikes in response, and the restrictions are eventually loosened or worked around rather than enforced absolutely.
The Shadow Market: Anatomy of a $137 Billion Industry
The demand for censorship circumvention and internet privacy has produced one of the fastest-growing technology markets of the 2020s: the VPN and proxy services industry.
The global VPN market was valued at approximately $44.6 billion in 2022. Grand View Research projects it will reach $137.7 billion by 2030, a compound annual growth rate of 17%. That growth is being driven by a confluence of forces: expanding internet censorship, rising corporate cybersecurity budgets, the normalization of remote work (which requires secure access to corporate networks), and growing consumer awareness of surveillance and data monetization by platforms and ISPs.
The market structure is bifurcated. On the consumer side, a handful of large commercial VPN providers β NordVPN, ExpressVPN, Surfshark, Private Internet Access, ProtonVPN β compete on price, speed, and jurisdiction. NordVPN reportedly generates over $200 million in annual revenue and was acquired by Tesonet for an undisclosed sum. Proton AG (which operates ProtonVPN alongside the encrypted email service ProtonMail) has positioned itself as the privacy-first alternative and offers a free tier that has been widely adopted in countries with restricted internet access.
On the infrastructure side, residential proxy networks have become a substantial commercial category. These services route traffic through the IP addresses of real residential devices β typically through browser extensions installed (often with limited disclosure) on consumer devices β making it nearly impossible for destination websites to identify traffic as coming from a proxy. Bright Data, a market leader in residential proxy services, reportedly manages a network of over 72 million IP addresses across 195 countries and serves customers including Fortune 500 companies engaged in competitive price intelligence and market research.
The free tier of the market β free web proxy sites, Tor, Psiphon, Lantern β serves the censorship circumvention use case where ability to pay is constrained, often operating on grant funding from organizations like the Open Technology Fund, which has backed circumvention tools with US government funding that is explicitly intended to support digital freedom in authoritarian states.
The Arms Race: Censors vs. Circumventers
Internet restriction and circumvention have developed as a co-evolutionary arms race, each side deploying successive generations of technique and counter-technique.
First-generation blocking was simple: block a list of IP addresses. The response was equally simple: use a different IP address, i.e., a proxy.
Second-generation blocking added DNS poisoning β intercepting domain name lookups to return no results or a blocked-page notice for prohibited domains. The circumvention response was DNS-over-HTTPS (DoH), which encrypts DNS queries so they cannot be intercepted.
Third-generation blocking uses deep packet inspection (DPI) β analyzing the content of traffic packets to identify VPN protocols even when traffic appears encrypted. China's Great Firewall is the most sophisticated DPI system in the world and can identify and block many common VPN protocols. The circumvention response has been obfuscation tools (like Tor's "pluggable transports" and the Shadowsocks protocol developed specifically to evade DPI) that disguise VPN traffic as ordinary HTTPS web browsing.
Fourth-generation restriction, as demonstrated in Iran during shutdowns, is simply disconnecting the physical infrastructure β cutting international bandwidth cables or disabling mobile data networks. This approach defeats all software-based circumvention. The counter-response β not yet at mass scale β involves satellite internet services like Starlink, which can provide internet access independent of national terrestrial infrastructure. Ukraine's use of Starlink terminals following infrastructure attacks in 2022 demonstrated the strategic significance of this capability, and SpaceX has indicated interest in expanding availability to users in restricted countries.
The arms race has no endpoint. Each innovation in restriction produces a corresponding innovation in circumvention, and the economics favor the circumventers: restriction systems cost states significant ongoing investment to maintain at scale, while circumvention tools can be distributed globally at near-zero marginal cost.
Beyond Censorship: The Commercial Proxy Economy
While censorship circumvention generates the most dramatic proxy demand stories, the commercial use of proxy infrastructure may generate more economic value.
Web scraping β the automated extraction of data from websites at scale β is one of the foundational data acquisition methods for competitive intelligence, price monitoring, academic research, and AI training data collection. Web scraping depends on proxy networks because websites implement rate limiting and IP-based blocking to deter automated access. A scraping operation that routes requests through thousands of rotating residential IP addresses is effectively invisible to standard bot-detection systems.
The industries that depend on this infrastructure are significant: e-commerce price comparison engines, travel fare aggregators, real estate data platforms, financial market data providers, and the data brokers who supply marketing lists to advertisers all rely on proxy-assisted data collection. A substantial portion of the 68 million monthly proxy searches comes from developers and data engineers seeking proxy APIs, proxy list services, or guidance on building rotating proxy systems.
Cybersecurity testing also generates professional proxy demand. Penetration testing β authorized simulation of attacks on corporate systems β routinely uses proxy tools like Burp Suite (a web security testing platform with built-in proxy capabilities) to intercept and analyze traffic between a browser and a web application. Cybersecurity professionals searching for proxy tools are doing the opposite of evading detection: they are deliberately placing themselves between systems to understand how they communicate.
The commercial proxy market thus serves clients whose goals range from competitive intelligence (legally and ethically ambiguous) to academic research (clearly legitimate) to cybersecurity hardening (clearly legitimate) to data harvesting for AI training (rapidly evolving legal landscape). The same infrastructure serves all of them, which complicates any simple characterization of the proxy industry as either a tool of freedom or a tool of exploitation.
Who Profits From Restriction
The political economy of internet restriction is not simply states versus citizens. There are commercial beneficiaries of restriction on multiple sides.
China's domestic technology companies β Baidu, Alibaba, Tencent, ByteDance β operate in a market where foreign competition has been structurally excluded. The Great Firewall is simultaneously a censorship system and an industrial policy instrument. Baidu controls roughly 60% of Chinese search precisely because Google cannot operate there. TikTok's parent ByteDance generates its highest-margin revenue internationally, outside China, through a platform that is effectively banned in its home country in its international form (Douyin is the domestic variant, subject to different content rules).
The VPN industry profits from the same restrictions it nominally exists to defeat. NordVPN's business model depends on internet censorship remaining prevalent and on users valuing their privacy from ISPs, advertisers, and state surveillance. A world with genuine end-to-end internet freedom would require a significant restructuring of the commercial VPN value proposition.
Western technology companies occupy a complex position. Google, Meta, and Apple have all made concessions to censorious governments β removing apps from app stores at state request, complying with data localization requirements, censoring search results in specific jurisdictions β in order to maintain market access. Apple removed VPN apps from its Chinese App Store in 2017 at government request, directly limiting Chinese users' ability to circumvent the Great Firewall. These decisions reflect shareholder-value optimization, but they also constitute corporate complicity in state-imposed restriction.
So What: The Stakes for Different Audiences
For citizens in censored countries, the practical implications are consequential. Proxies and VPNs work β imperfectly, with varying speeds, and with varying degrees of legal risk. In China, using unauthorized VPNs is technically illegal but enforcement against individual users is rare and inconsistent; enforcement targets VPN providers and corporate users far more systematically. In Russia, Roskomnadzor (the state internet regulator) has ordered ISPs to block VPN services that do not comply with state filtering requirements, but many services continue operating. Risk levels vary by jurisdiction; users in Iran and Belarus face more serious consequences than users in China for VPN use.
For businesses, the proxy economy is both an infrastructure tool and a legal minefield. Web scraping using residential proxy networks operates in legal grey zones: the Computer Fraud and Abuse Act in the US, the GDPR in Europe, and various national cybercrime laws all potentially apply, with inconsistent enforcement. Companies using proxy networks for competitive intelligence should be aware that the legal landscape is actively evolving, with several landmark scraping cases having reached appellate courts since 2020.
For policymakers and technologists, the proxy demand data is a diagnostic. Sixty-eight million monthly searches for circumvention tools is not a neutral fact. It is evidence of a global internet that has fractured along political lines, producing what scholars call "the splinternet" β a set of incompatible national internets that share physical infrastructure but operate under incompatible rules. The splinternet is accelerating, not reversing. India's periodic platform bans, the EU's Digital Services Act, and the US government's scrutiny of Chinese-owned platforms are all contributing to a world where the open internet of the 1990s is increasingly a historical artifact.
For investors, the VPN and proxy services market is a structural growth bet on the persistence of internet restriction and privacy demand β both of which are expanding. The risk is regulatory: if major jurisdictions mandate that VPN providers log and share user data (as some governments have attempted), the privacy value proposition collapses. ProtonVPN's Swiss jurisdiction and end-to-end encryption architecture are specifically designed to survive this regulatory risk; whether they will is an open question.
The 68 million monthly searches for "proxy" tell a story that is simultaneously about technology, politics, commerce, and human rights. What people are actually searching for when they type that word is not a server configuration β it is access to the same internet that others take for granted. The fact that tens of millions of people must perform a workaround every month just to reach an uncensored web is one of the defining facts of digital life in the 2020s. It is also, as markets go, an extremely well-monetized one.
Related reading: The Great Firewall and the Future of Internet Censorship, ChatGPT and the AI Knowledge Revolution, Google Maps, Privacy, and the Urban Surveillance Economy