Fact-checked by Grok 2 weeks ago

Proxy

A proxy denotes the , , or office of a who serves as a substitute for another, encompassing both the to act on behalf of someone else and the or granting or exercising that . The term derives from a contraction of the Middle English procuracie (c. 1400–1450), itself from Anglo-Norman procuracie and procuratia, ultimately tracing to Latin prōcūrātiō, meaning "" or "management." In legal and political contexts, proxies facilitate where direct participation is impractical, such as shareholders authorizing votes in corporate meetings or members delegating ballots in assemblies, thereby enabling broader decision-making without universal attendance. This mechanism has been integral to structures, allowing efficient aggregation of interests while raising concerns over potential misalignment between principals and agents. In and networking, a operates as an intermediary that "breaks" the direct connection between clients and destination servers, accepting and forwarding traffic to enhance , enforce controls, for , or anonymize identities. The concept entered technical lexicon in the , with early uses designating local representatives for remote objects in distributed systems, evolving into widespread tools for preservation amid expansion, though they can also enable circumvention of restrictions or mask malicious activities.

Computing and Networking

Proxy Servers

A proxy server functions as an intermediary system between client devices and target s on a , intercepting requests and responses to facilitate communication while potentially modifying or logging traffic. In this role, it receives a client's request for resources—such as web pages or files—from the originating device, forwards the request to the destination using its own , retrieves the response, and delivers it back to the client. This process masks the client's from the destination , providing a layer of that can enhance or enable centralized control over access. The concept of proxies in networking emerged to impose structure on distributed systems, with the term first applied in this context by researcher Marc Shapiro in 1986 to describe local representatives for remote objects. Early implementations focused on caching frequently requested resources to reduce usage and , particularly as grew in the early 1990s; for instance, the first dedicated proxy servers for and IP replacement appeared around 1994. By the mid-1990s, proxies had evolved into tools for organizational networks, enabling content filtering, load balancing, and security enforcement, such as blocking access to specific domains or stripping elements like images from pages to optimize transmission. Proxy servers operate at the of the , typically handling protocols like HTTP, , or , where they can inspect, authenticate, or data without requiring client-side modifications in transparent setups. For example, in a forward proxy configuration common for client , the proxy authenticates users and applies policies before relaying requests, while reverse proxies—positioned before servers—manage incoming to distribute loads or backend infrastructure. This intermediary mechanism inherently introduces potential due to additional hops but yields benefits like improved in enterprise environments, where a single proxy can serve multiple clients by storing cached responses to identical requests, thereby minimizing redundant data transfers across slower links.

Types and Mechanisms

Forward proxies function as intermediaries for client requests directed outward to external servers, typically configured by clients to route traffic through the proxy for purposes such as anonymity, content filtering, or access control within a network. In operation, a client sends its request to the forward proxy, which evaluates policies before forwarding the request to the destination server, then relays the response back to the client while potentially modifying headers to obscure the original source IP. This type is commonly deployed in enterprise environments to enforce security policies on outbound traffic, with examples including Squid software supporting HTTP and HTTPS protocols. Reverse proxies, in contrast, manage inbound traffic on behalf of backend , intercepting client requests to distribute them across multiple for load balancing, caching, or enhanced without clients' awareness. They terminate the client connection, apply or SSL termination, and forward requests to appropriate internal , often concealing details from external clients to mitigate direct attacks. Popular implementations include and in reverse proxy mode, which support protocols like and handle tasks such as and compression. Transparent proxies intercept traffic without requiring client-side configuration, often via network routing, inline appliances, or to enforce policies like web caching or scanning on unconfigured endpoints. Unlike explicit proxies, they do not alter the destination in the client's request but transparently proxy it, preserving the of direct connection while applying rules; this mode is prevalent in ISP networks for optimization, as seen in deployments using Web Security Appliances. However, they offer limited since both client and proxy presence may be detectable in headers. Proxy mechanisms rely on specific protocols to tunnel or relay data: HTTP proxies primarily handle web traffic by parsing HTTP requests and responses, enabling functions like caching static content to reduce latency— for instance, an HTTP proxy can store frequently accessed pages, serving them directly on subsequent requests to cut origin server load by up to 50% in high-traffic scenarios. SOCKS proxies, particularly SOCKS5, provide a more versatile layer-agnostic approach, supporting , , and for diverse applications like torrenting or , without inspecting application-layer data, which enhances compatibility but reduces protocol-specific optimizations. Hybrid setups combine these, such as HTTPS-over-SOCKS for secure ing, where the proxy establishes connections without decrypting payload unless explicitly configured for inspection. variants further classify proxies: ones disclose their proxy nature but hide client IPs, while elite (high-) proxies masquerade as end-users by stripping all proxy indicators.

Applications, Benefits, and Risks

Proxy servers find applications in enhancing through content caching, where frequently requested data is stored locally to reduce and bandwidth consumption across networks. They also serve as intermediaries for , enabling organizations to filter and block malicious or unauthorized sites, thereby enforcing and policies. In corporate environments, forward proxies monitor and log user activity for auditing purposes, while reverse proxies distribute incoming traffic to backend servers for load balancing and scalability in web services. Additionally, proxies facilitate anonymous browsing by substituting the client's , aiding in geo-restriction circumvention for legitimate or tasks. The primary benefits of proxy servers include improved security by inspecting packets at the , akin to an that prevents direct exposure of internal systems to external threats. Caching mechanisms deliver savings, with studies showing reductions in data transfer volumes by up to 50% in high-traffic scenarios through stored copies of static content. They enhance administrative oversight, allowing centralized management of and detection via filtering. For reverse proxies, benefits extend to origin server protection and efficient , as evidenced in large-scale deployments optimizing service delivery. However, proxy servers introduce risks such as man-in-the-middle vulnerabilities, particularly with unencrypted connections or proxies running outdated software, which can expose to and modification. Malicious or poorly configured proxies may log sensitive , inject advertisements, or distribute , amplifying threats in free or implementations. overhead from rerouting can degrade speeds, and misconfigurations may create open ports susceptible to exploitation, potentially serving as entry points for lateral movement in networks. Enterprises face third-party risks if proxies leak or enable unauthorized , underscoring the need for vetted, encrypted proxies to mitigate these hazards.

Politics, Law, and Governance

Proxy Voting

Proxy voting in legislative contexts permits a to delegate their vote to a designated colleague, enabling participation despite physical absence from the voting chamber. This mechanism contrasts with absentee or in elections, as it applies to elected representatives exercising authority on behalf of constituents rather than individual voters. Traditionally, has been restricted in national legislatures to preserve requirements, foster in-person , and ensure , with the U.S. Constitution's Quorum Clause (Article I, Section 5) interpreted by some scholars to preclude it for establishing a quorum in the or . In the U.S. , has historically been confined to committees, where rules vary by panel and often require written authorization specifying votes on particular matters. The full chamber avoided until May 15, 2020, when Democrats, citing risks, adopted H. Res. 965 to allow unlimited for the duration of the 116th , marking the first such practice in House history and enabling members to vote remotely via or without physical presence. This rule permitted up to 25 members—fewer than the 218 needed for —to conduct business, drawing criticism for potentially violating constitutional mandates on and , as proxies do not constitute personal presence. Republicans challenged it legally, leading to a 2020 federal court dismissal on mootness after Speaker Pelosi refused to defend the suit, and the practice ended with the 117th in 2023, though Democrats proposed reinstating it in 2023 via amendments to . The U.S. Senate has maintained stricter limits, permitting proxy votes only in committees under rules like Senate Rule XXVI, which allow delegation for absences but prohibit them for cloture or final passage on the floor to uphold debate and quorum integrity. Proxy voting expansions during the pandemic were minimal, with senators relying more on unanimous consent or delayed votes rather than broad proxies. In contrast, the UK House of Commons introduced a limited proxy voting pilot on January 28, 2019, initially for MPs on parental leave, allowing nomination of a single proxy to vote "aye" or "no" on all divisions; this was made permanent on September 23, 2020, following a Procedure Committee review, but remains confined to specified circumstances like childbirth or serious illness, excluding broader remote voting. Other legislatures exhibit varied approaches: Canada's prohibits proxy voting outright, emphasizing physical presence, while Australia's permits proxies in committees but not on the floor. Rationales for proxy voting include accommodating family leave or health crises, as evidenced by the UK's parental scheme increasing female participation rates post-2019, yet critics argue it dilutes by decoupling votes from real-time debate and risking abuse, as seen in U.S. House where proxy usage peaked at over 90% of Democrats in sessions. Empirical analyses of the U.S. experience indicate no significant shift in legislative outcomes but highlight reduced incentives for bipartisan due to diminished interactions.

Corporate Proxy Practices

Corporate proxy practices encompass the mechanisms by which shareholders delegate their voting authority to representatives, known as proxies, for decisions at annual or special meetings, including director elections, executive compensation approvals, and merger consents. This system enables participation without physical attendance, with votes typically cast via mailed ballots, electronic platforms, or appointed agents under guidelines outlined in proxy statements filed with the U.S. Securities and Exchange Commission (SEC). Under SEC Regulation 14A, public companies must distribute proxy materials at least 21 days before meetings, disclosing material information to facilitate informed voting. The SEC's proxy rules originated in the 1930s following the , aiming to curb manipulative solicitation practices by mandating transparency and fairness in communications calculated to influence votes. Key regulations include Rule 14a-3, requiring detailed proxy statements, and prohibitions on false or misleading statements under Rule 14a-9. Amendments over decades, such as the 2022 universal proxy rules under Rule 14a-19, compel companies to include dissident nominees on ballots, enabling to mix management and activist slates, effective for contests starting September 1, 2022. These rules have increased contested elections, with 20 universal proxy contests voting in 2024 versus 17 in 2023, though outcomes often favor incumbents due to inertia. Proxy advisory firms, primarily Institutional Shareholder Services (ISS) and Glass Lewis, exert significant influence by recommending votes to institutional clients managing trillions in assets, controlling about 97% of the market. Their guidelines shape outcomes on governance issues, but critics, including U.S. congressional committees and state attorneys general, argue these firms prioritize ideological agendas—such as environmental, social, and governance (ESG) criteria—over financial returns, with documented conflicts like revenue from corporate consulting. For instance, ISS and Glass Lewis have recommended against directors for insufficient ESG disclosures, despite empirical evidence linking such policies weakly to shareholder value, leading to SEC scrutiny and 2020 rules classifying their advice as solicitations, partially rescinded in 2022 amid litigation. In 2025, Glass Lewis announced discontinuation of benchmark policies by 2027, shifting to client-customized frameworks amid backlash. Proxy fights, or contests, arise when shareholders solicit proxies to oust directors or alter strategy, often initiated by activists holding 1-5% stakes. Tactics include filing preliminary proxy statements, launching websites, and engaging , with costs averaging $10-20 million per side. Notable examples include Starboard Value's challenge at , where management retained control by securing 82% of votes through targeted retail outreach, highlighting the efficacy of direct engagement over reliance on advisors. Success rates for dissidents hover around 20-30% for board seats, per historical data from 1977-1988 contests, though recent universal proxies have facilitated more nuanced outcomes without full control shifts. Recent trends reflect backlash against ESG-driven voting, with environmental and social proposals seeing median support drop to 1-2% in from peaks above 20% in 2021, amid rising anti-ESG filings quadrupling to 112 in 3000 firms by 2024. proposals, such as and majority voting, increased 13% in 2024, gaining traction with average support exceeding 90%. no-action relief for excluding proposals surged in , signaling stricter enforcement of ownership thresholds, while institutional investors increasingly favor customized voting over one-size-fits-all advisor benchmarks to align with fiduciary duties. These shifts underscore a toward value-focused , countering prior overemphasis on non-financial metrics unsubstantiated by causal links to performance.

Legislative and Political Proxies

In federal legislative systems like the , political proxies denote elected representatives who safeguard subnational interests, such as those of states, during national lawmaking. These proxies enable states to voice concerns and negotiate outcomes in , mitigating risks of federal dominance; for example, in Garcia v. San Antonio Metropolitan Transit Authority (1985), the upheld uniform federal labor standards partly because states could protect their autonomy via these congressional representatives acting as their advocates. This mechanism fosters intergovernmental bargaining but depends on the proxies' alignment with principal interests, potentially vulnerable to partisan capture or pressures. Political proxies extend to indirect agents advancing external agendas in domestic , including organizations or officials serving as stand-ins for state or entities. Such arrangements, akin to proxy politics, allow principals to exert covertly, as when governments deploy allied groups to shape without overt responsibility; in , for instance, the U.S. has backed local political actors as proxies to Iranian sway, blending support with claims of indigenous agency to pursue geopolitical aims domestically. This tactic provides deniability but invites scrutiny over authenticity, with empirical analyses showing proxies often prioritize sponsor goals over local priorities, eroding trust in legislative independence. In legislative practice, proxies manifest through captured institutions or surrogates, where ostensibly neutral bodies amplify specific ideologies. Senior civil servants, for example, may engage in self-politicization by aligning administrative actions with ministerial preferences, functioning as proxies that bypass formal political ; studies of bureaucracies reveal this proxy dynamic sustains policy continuity across elections but risks entrenching biases, as unelected actors interpret "the wants it" to justify . Similarly, corporate executives channeling firm resources into political spending serve as proxies for shareholders in influencing , with U.S. data indicating over $3 billion in annual corporate political contributions by 2020, often undisclosed to evade direct scrutiny. These practices highlight causal tensions between delegated and principal oversight, where proxies' information asymmetries can distort outcomes from empirical voter or signals.

Military and Geopolitics

Proxy Wars

Proxy wars constitute armed conflicts in which external major powers furnish indirect support—such as arms, funding, training, or intelligence—to local combatants, enabling them to pursue objectives aligned with the sponsors' geopolitical aims while avoiding direct military engagement between the patrons themselves. This approach leverages local actors as proxies to exert influence over target states or regions, often in civil wars or interstate disputes, with the intent of shaping political outcomes without risking escalation to full-scale war between the supporting powers. The strategy hinges on plausible deniability, allowing sponsors to disclaim direct responsibility for proxy actions, thereby mitigating domestic political costs and international reprisals. The primary strategic rationales for proxy warfare include containing adversaries' expansion at lower risk than direct intervention, particularly in eras of mutual nuclear deterrence; conserving resources by shifting combat burdens to local forces; and probing enemy commitments through calibrated support levels. For instance, during the (1947–1991), the and pursued proxy engagements to export their ideologies— versus —across the Third World, avoiding head-on clashes that could invoke nuclear threats under doctrines like mutually assured destruction. This period saw over a dozen major proxy conflicts, where superpowers funneled billions in aid: the U.S. provided approximately $3.3 billion in military assistance to by 1973, while the Soviets supplied with $2 billion annually in weaponry by the war's end. Prominent Cold War examples illustrate the mechanics and consequences. In the Korean War (1950–1953), U.S.-led UN forces backed South Korea against North Korean invaders supported by Soviet MiG-15 jets and Chinese "volunteer" troops totaling over 1.3 million, resulting in 2.5 million civilian deaths and a stalemated armistice without unification. The Vietnam War (1955–1975) featured U.S. escalation to 543,000 troops by 1969 supporting South Vietnam, countered by Soviet and Chinese arms to North Vietnam and the Viet Cong, culminating in 58,220 U.S. fatalities, 1.1 million North Vietnamese military deaths, and South Vietnam's fall on April 30, 1975, after U.S. withdrawal under the 1973 Paris Accords. The Soviet-Afghan War (1979–1989) saw the USSR deploy 115,000 troops against mujahideen guerrillas armed with U.S. Stinger missiles via Operation Cyclone (totaling $3 billion in CIA aid), leading to 15,000 Soviet deaths, economic strain contributing to the USSR's 1991 dissolution, and the empowerment of future extremists like Osama bin Laden. Similarly, Angola's civil war (1975–2002) involved Cuban troops (over 300,000 rotated) and Soviet aid backing the MPLA government against U.S.- and South African-supported UNITA rebels, prolonging fighting that killed 500,000 and devastated infrastructure until a 2002 ceasefire. Outcomes of proxy wars frequently diverge from sponsors' expectations, yielding protracted insurgencies, humanitarian crises, and blowback. Proxies, once armed, may pursue independent agendas, as in where U.S.-backed fighters later formed , orchestrating the September 11, 2001, attacks that killed 2,977. Such conflicts have historically caused disproportionate civilian suffering—e.g., Vietnam's use of defoliated 4.5 million acres, leading to 400,000 deaths from related illnesses—and economic ruin, with Angola's GDP stagnating below $2,000 through the amid resource exploitation. While enabling great-power competition without direct attrition, proxy warfare erodes norms against intervention, fosters arms proliferation (e.g., 1980s Soviet exports flooded battlefields), and complicates post-conflict stabilization, as external patrons withdraw support post-victory or defeat. Empirical analyses indicate proxy-involved civil wars last 50% longer on average than non-proxy ones, with higher rates due to entrenched factionalism.

Historical Development

The practice of proxy warfare, wherein a principal power supports third-party actors to advance its interests without direct military engagement, traces its origins to ancient civilizations. In the (431–404 BCE), and pursued indirect confrontations through allied city-states, as seen in the Corcyrean Civil War, where support for local factions escalated regional disputes into broader alliances without immediate principal involvement. Similarly, during the Sicilian Expedition in 415 BCE, backed Syracuse as a proxy to undermine Athenian naval power, demonstrating early strategic use of intermediaries to extend influence while managing risks of escalation. The further refined this approach by employing "barbarian" tribes along frontiers to buffer invasions and maintain internal stability, though such dependencies contributed to vulnerabilities that hastened Rome's decline in the 5th century . In medieval and , proxy mechanisms prolonged conflicts and facilitated colonial expansion. The (1337–1453) saw English and French monarchs rely on feudal lords and mercenaries as proxies, which extended hostilities and disrupted diplomatic resolutions amid transitions from to centralized states. By the , entities like the operated as layered proxies for , conducting warfare in from the 1600s onward to secure trade routes and territories while insulating the metropole from direct costs and casualties. The (1775–1783) exemplified transatlantic proxy dynamics, with providing arms, troops, and naval support to American colonists against ; at the decisive Yorktown siege in 1781, French forces outnumbered Continental troops, enabling victory without full French commitment to the continental theater. The 20th century marked a shift toward ideologically driven proxy strategies, particularly in the . The (1936–1939) served as a testing ground, with and supplying Francisco Franco's Nationalists, while the armed Republican forces, allowing great powers to experiment with tactics and equipment ahead of without immediate global entanglement. This evolved into the era (1947–1991), where nuclear deterrence compelled the and to channel rivalry through over 40 proxy conflicts worldwide, avoiding direct clashes that risked mutual destruction. The (1950–1953) epitomized this development, as the USSR and furnished North Korean forces with arms and advisors, countered by U.S.-led UN support for , resulting in over 2.5 million deaths while preserving superpower restraint. Subsequent engagements, including (1955–1975) and (1979–1989), institutionalized proxy warfare as a core geopolitical tool, enabling influence projection through local actors amid bipolar tensions.

Strategic Rationales and Outcomes

Proxy wars serve as a mechanism for great powers to pursue strategic objectives in contested regions without incurring the full costs and risks of direct engagement. Primary rationales include advancing interests by denying adversaries territorial gains or resources, as seen in motivations for external support in civil conflicts where geopolitical concerns predominate. Sponsors leverage proxies to test technologies, train forces indirectly, and exert influence through deniable operations, thereby maintaining political flexibility and avoiding escalation to broader confrontations, such as nuclear exchanges during the era. This approach externalizes human and financial costs to local actors while allowing sponsors to shape outcomes aligned with their diplomatic goals, such as containing ideological expansion. Operational further drives proxy strategies, enabling states to operate below thresholds of overt and retain options for disengagement if dynamics shift unfavorably. For instance, during the , the and backed opposing sides in conflicts like the (1975–2002), where each sought to counter the other's global reach without committing expeditionary forces on a scale that risked direct clash. Such rationales stem from causal assessments of power balances: proxies amplify a sponsor's asymmetrically, particularly when domestic constraints limit direct . Outcomes of proxy wars, however, often diverge from sponsors' expectations due to incomplete control over proxy actors and unintended escalatory dynamics. While successes occur—such as the U.S.-backed contributing to the Soviet Union's withdrawal from in 1989 after a decade-long occupation that cost over 15,000 lives and strained its —proxies frequently evolve independently, leading to blowback like the rise of from empowered Islamist networks. In (1955–1975), U.S. proxy support for failed to prevent communist victory, resulting in over 58,000 American deaths and domestic political fallout without achieving of Soviet influence. Proxy engagements commonly prolong conflicts, exacerbate humanitarian crises, and destabilize regions through spillover effects, as sponsors' divergent agendas incentivize tactics like indiscriminate violence to outlast rivals. RAND analyses indicate that while short-term gains in influence may materialize, long-term costs include empowered non-state threats and eroded sponsor credibility when proxies defect or pursue misaligned goals, as evidenced by the nature undermining sustained oversight. In aggregate, proxy wars during the numbered in the dozens, often yielding pyrrhic victories: strategic denial for one side but at the expense of regional anarchy, with civilian casualties in the millions across theaters like (1950–1953) and . These patterns underscore a core tension: the very attributes enabling proxy utility—deniability and low commitment—also foster unpredictability, where causal chains from sponsorship to prove fragile.

Contemporary Examples and Controversies

In the , which began with 's full-scale invasion of on February 24, 2022, extensive military aid from members—including over $118 billion in U.S. assistance alone by mid-2024—has fueled debates over whether the conflict constitutes a between the and . Proponents of the proxy label, including Russian officials and some strategic analysts, argue that serves as a for Western powers seeking to weaken without direct confrontation, evidenced by intelligence sharing, training programs, and long-range weapons supplied to Ukrainian forces. Critics, such as researchers at , counter that 's agency as a defending against territorial invasion disqualifies it from traditional proxy definitions, where proxies lack independent strategic goals; they emphasize 's pre-invasion alignment with EU and aspirations as causal rather than externally imposed. Controversies persist around escalation risks, with reports of near-misses involving nuclear rhetoric from and delays in Western aid decisions highlighting how proxy-like dynamics may prolong stalemates while incurring massive Ukrainian casualties exceeding 500,000 by 2025 estimates from Ukrainian and Western intelligence. The Yemeni Civil War, intensified by Saudi Arabia's military intervention on March 26, 2015, against Houthi forces, represents a clear case of proxy rivalry between Saudi Arabia and Iran, with the latter supplying ballistic missiles, drones, and advisory support to the Houthis, enabling attacks on Saudi infrastructure and, since October 2023, commercial shipping in the Red Sea. This external involvement has exacerbated a humanitarian catastrophe, including over 150,000 direct combat deaths and 227,000 from indirect causes like starvation and disease as of 2021 UN data, with 21 million Yemenis—two-thirds of the population—requiring aid in 2024 amid fragile ceasefires. Controversies include Saudi claims of Iranian orchestration versus evidence of Houthi autonomy in decision-making, such as their alignment with Palestinian causes post-October 7, 2023, attacks on Israel; International Crisis Group analyses stress that while proxy elements amplify local grievances, framing the war solely as Saudi-Iranian overlooks Yemeni factional agency and failed governance under former president Saleh. U.S. and UK airstrikes against Houthi targets in early 2024, aimed at securing maritime routes, have drawn criticism for violating Yemen's sovereignty and risking broader entanglement, underscoring proxy strategies' tendency to entrench low-intensity conflicts over resolution. Syria's , ongoing since 2011, continues as a multifaceted in 2025, with and bolstering Bashar al-Assad's regime through airstrikes and ground forces— maintaining bases like —while conducts operations against YPG militias and the U.S. sustains a presence with (SDF) in the northeast, controlling oil fields. Over 500,000 deaths and 6.9 million internal displacements persist, with Assad's forces regaining most territory by 2020 but facing renewed Turkish-backed offensives and Israeli strikes on Iranian-linked assets exceeding 200 in 2024 alone. Key controversies revolve around the war's "frozen" status, where proxy interventions have prevented Assad's total but sustained fragmentation; UN reports highlight how Russian vetoes in the Security Council block accountability for chemical weapons use, while U.S. policy shifts—such as troop drawdowns under —exposed risks of vacuums exploited by remnants and Iranian expansion. Analysts note systemic biases in underreporting Assad's atrocities compared to overemphasis on rebel extremism, complicating neutral assessments of proxy efficacy in achieving strategic denial versus humanitarian costs.

Other Uses

Agency and Representation

In agency law, a establishes a where one , known as the or proxy holder, is empowered to exercise specific powers belonging to , effectively allowing to act through another at . This "proxy power" forms the core of , distinguishing it from mere contractual arrangements by enabling the proxy to create legal effects—such as binding contracts or casting votes—that are attributed directly to . The authority is typically conferred via a written instrument, such as a or form, which outlines the scope of representation to prevent overreach. Proxies differ from general agents in their often limited, task-specific nature; for instance, a special proxy might authorize actions only in a defined context, like medical decisions during incapacity, while adhering to fiduciary obligations of , , and to avoid conflicts of . In jurisdictions, this mechanism traces to principles of , where the principal retains ultimate control but risks liability for the proxy's actions within the granted authority. Representation through a proxy emphasizes substitutional agency, where the proxy stands in the principal's position for external dealings, imputing the principal's intent and consequences. Legal systems impose revocability on proxies unless irrevocable elements like consideration or coupled authority are present, ensuring alignment with the principal's interests. Breaches, such as unauthorized acts, can lead to remedies like rescission or damages, underscoring the causal link between delegation and accountability. For example, in durable powers of attorney effective upon incapacity—recognized in U.S. states under uniform acts since the 1980s—a designated proxy manages assets or healthcare, representing the principal's prior directives amid empirical evidence of reduced guardianship costs and faster decision-making. Critics of expansive proxy use highlight agency costs, including moral hazard where proxies might prioritize self-interest, as evidenced in empirical studies of delegation inefficiencies in non-corporate settings. Nonetheless, proxies facilitate representation in scenarios of absence or incapacity, with courts enforcing them based on clear intent to mitigate disputes. This framework promotes causal realism in legal outcomes, attributing effects to the principal while constraining proxy discretion through verifiable documentation and oversight.

Arts, Entertainment, and Media

In and video , proxy media refers to lower-resolution, transcoded duplicates of original high-resolution , enabling smoother workflows on with limited power. These files reduce data size and computational demands during nonlinear , allowing real-time playback and effects application without rendering delays, while editors relink to originals for final high-quality export. Proxy workflows became standard in the with the rise of and higher resolutions, integrated into professional software such as , , and , where users generate proxies during ingest or on demand to optimize performance. The 2013 American psychological horror film Proxy, directed by Zack Parker, depicts a narrative of deception and violence, opening with a graphic assault scene that sets a tone of pathological substitution and proxy agency among characters. In literary analysis, the concept of "proxy narrative" describes plot structures where key scenes function as symbolic substitutes for unresolved events, as examined in Henry James's The Ambassadors (1903), where peripheral actions proxy deeper psychological conflicts. Cultural studies explore proxies as stand-ins shaping media representation, such as in and digital interfaces where intermediary objects mediate human experience, as detailed in Dylan Mulvin's 2021 book Proxies: The Cultural Work of Standing In, which traces their role from early technologies to contemporary streaming. In internet-based horror media originating from lore, "proxies" denote individuals or entities acting as extensions of a controlling force, notably in the mythos popularized through , videos, and games since 2009.

References

  1. [1]
    PROXY Definition & Meaning - Merriam-Webster
    1. The agency, function, or office of a deputy who acts as a substitute for another. 2. a : authority or power to act for another b : a document giving such ...
  2. [2]
    PROXY Definition & Meaning - Dictionary.com
    noun · a person authorized to act on behalf of someone else; agent. to vote by proxy · the authority, esp in the form of a document, given to a person to act on ...<|separator|>
  3. [3]
    Proxy - Etymology, Origin & Meaning
    "agency of one who acts instead of another, office or authority of a substitute; letter of power of attorney," contraction of Anglo-French procuracie (c. 1300)
  4. [4]
    proxy | Wex | US Law | LII / Legal Information Institute
    A proxy is a person who represents a member in the shareholders' meeting of a company, with a legal document that could prove their authority.
  5. [5]
    PROXY | definition in the Cambridge English Dictionary
    authority given to a person to act for someone else, such as by voting for them in an election: by proxy My brother's voting for me by proxy in the club ...
  6. [6]
    PROXY definition in American English - Collins Dictionary
    A proxy is a person who is authorized to vote shares for shareholders who are not present. Shareholders can and often do give management their proxies, ...
  7. [7]
    proxy - Glossary | CSRC - NIST Computer Security Resource Center
    A proxy is an application that “breaks” the connection between client and server. The proxy accepts certain types of traffic entering or leaving a network.
  8. [8]
    What is a Proxy Server? Definition, Uses & More - Fortinet
    A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a ...
  9. [9]
    The Etymology of "Agent" and "Proxy" in Computer Networking ...
    The term proxy was seemingly first used in the network context by Shapiro [Shap] in 1986 to designate one object as a local representative of a remote object.
  10. [10]
    What is a reverse proxy? | Proxy servers explained - Cloudflare
    A reverse proxy is a server in front of web servers, intercepting client requests and forwarding them to the web servers.
  11. [11]
    What is a Proxy Server? - Cisco Umbrella
    Feb 23, 2023 · A proxy server (also known as “a proxy” in IT circles) is an intermediary between an end user/computer and the internet.
  12. [12]
    Proxies – Networks at ITP - NYU
    Brief and incomplete history of proxy. The term proxy was first used in the network context by Shapiro in 1986 to designate one object as a local representative ...
  13. [13]
    What is a Proxy Server and How Does it Work? - Varonis
    A proxy server acts as a gateway between you and the internet. It's an intermediary server separating end users from the websites they browse.What is a Proxy Server? · Why Should You Use a Proxy... · Proxy Server Risks
  14. [14]
    Internet-history: how proxies appeared - Astro
    Apr 2, 2022 · The first anonymizer appeared in 1992, and the first proxy server in 1994, which replaced real IP addresses with its own.
  15. [15]
    [PDF] Proxy-Server Based Firewalls Lecture Notes on “Computer and ...
    LAN (Local Area Network), meaning a local network of computers connected to the rest of the internet through a gateway machine (which is more commonly ...
  16. [16]
    Project 3 - Web Proxy Server - ECS Networking
    The proxy can inspect the requested URL and selectively block access to certain domains, reformat web pages (for instances, by stripping out images to make a ...<|separator|>
  17. [17]
    Proxy server security - IBM
    Proxy server security · Place a server that is meant for public access in a network that is separate from your local or internal network. · Disable utilities that ...
  18. [18]
    What is a Proxy Server? Definition, How It Works & More
    Nov 28, 2022 · A proxy server is a gateway that anonymously passes data between users and the internet. The proxy itself could be a computer system or a router.
  19. [19]
    Proxy Servers: How Proxies Work, Common Types, Uses & More
    Apr 14, 2025 · Types of proxies: Common proxy servers · Forward proxy: · Reverse proxy: · Transparent proxy: · Anonymous proxy: · High anonymity proxy (aka elite ...
  20. [20]
    Forward Proxy vs. Reverse Proxy: The Difference Explained
    Jun 26, 2025 · A forward proxy deals with client traffic, regulating and securing it. In contrast, a reverse proxy shields servers by handling client requests.What Is a Reverse Proxy? · Forward Proxy vs. Reverse...
  21. [21]
    What is a Proxy Server? Types, Uses, Pros/Cons & More | Hostwinds
    Apr 3, 2024 · 3 Main Types of Proxy Servers · Forward Proxy · Reverse Proxy · Transparent Proxy.
  22. [22]
    What is a Transparent Proxy | Client vs. Server Side Use Cases
    Transparent proxies are sometimes known as forced proxies because they can be applied to a user's connection without any change to their computer's proxy ...
  23. [23]
    What is the difference between transparent and forward proxy mode?
    May 2, 2022 · The only major difference between transparent and forward mode on the WSA is that in transparent mode, the WSA responds to both transparent and explicit HTTP ...
  24. [24]
    SOCKS vs HTTP Proxy: What Is the Difference? - Oxylabs
    May 30, 2025 · SOCKS proxies do not directly use the HTTP protocol. It is commonly used for more general purposes such as content streaming and P2P file ...
  25. [25]
    Differences Between SOCKS and HTTP Proxy: A Complete Guide
    Aug 23, 2024 · Proxy servers can be categorized by protocol, with HTTP and SOCKS being the two main ones. This guide will help you determine whether HTTP or ...
  26. [26]
    What Is a Proxy Server? Security Risks and Corporate Use Cases
    Apr 30, 2025 · How Businesses Use Proxy Servers · 1. Access Control and Content Filtering · 2. Monitoring and Visibility · 3. Performance Optimization · 4.2. Monitoring And Visibility · 3. Open Proxies And Shadow... · Proxy Servers Vs. Vpns...
  27. [27]
    What is a Proxy Server? Definition and Use Cases - TechTarget
    Mar 7, 2025 · In the enterprise, a proxy server facilitates security, administrative control and caching services, among other purposes. In personal computing ...How Proxy Servers Work · Types Of Proxy Servers · Proxy Server Security
  28. [28]
    [PDF] Application Firewalls and Proxies – Introduction and Concept of ...
    As one might reasonably imagine, there are both benefits and drawbacks to using application firewall technology. Benefits. Another layer of security. An ...
  29. [29]
    Proxy Servers Advantages - GeeksforGeeks
    Sep 20, 2023 · Security: Proxies help in providing a safe and secure connection to access the internet. It prevents attacks from hackers. By utilizing proxies, ...
  30. [30]
    [PDF] A Large-Scale Measurement Study of the PROXY Protocol and its ...
    Feb 24, 2025 · Abstract—Reverse proxy servers play a critical role in optimiz- ing Internet services, offering benefits ranging from load balanc- ing to ...
  31. [31]
    [PDF] Empirical Analysis of the Risks of Data-Saving Mobile Browsers
    In summary, our experiments show that enabling data savings exposes users to (i) proxy servers running outdated software, (ii) man-in-the-middle attacks due to ...
  32. [32]
    What is a Proxy Server? How They Work + Security Risks - UpGuard
    Jun 25, 2025 · Proxy servers work by facilitating web requests and responses between a user and web server. Typically, a user accesses a website by sending a ...<|control11|><|separator|>
  33. [33]
    The perils of proxies: the backdoor into your data - SecurityBrief UK
    Mar 10, 2023 · Some proxies run on open ports, which can pose significant security risks, especially if insufficiently protected or misconfigured. Some ...
  34. [34]
    Proxies, Quorum, and Legislative Immunity – Kimo Gandall
    Aug 1, 2024 · This essay argues that quorum cannot be established by proxy. Several primary sources, ranging from the Constitutional convention to various parliamentary ...
  35. [35]
    Voting Present by Proxy is an Unconstitutional Oxymoron
    May 6, 2020 · The Constitution leaves a great deal of leeway to the House and Senate for establishing their own rules of procedure. But one provision is ...
  36. [36]
    EXPLAINER: Proxy Voting in Congress | Bipartisan Policy Center
    Mar 26, 2020 · Senate committees currently allow their members to vote by proxy in committees, with differing rules from committee to committee on how they ...
  37. [37]
    In History of Congress, House Democrats' New Proxy Voting Is Radical
    May 29, 2020 · The House of Representatives has adopted a resolution that, for the first time, no longer would require members to show up to vote.
  38. [38]
    Proxy voting turns one: The past, present, and future of remote ...
    May 21, 2021 · It's been just over a year since the House instituted proxy voting in response to the health risks of gathering in person during the COVID-19 pandemic.
  39. [39]
    Proxy voting - UK Parliament
    A proxy vote is a vote cast by one MP on behalf of another MP in a House of Commons division. Proxy voting has been allowed only in very specific circumstances.
  40. [40]
    Proxy voting in divisions in the House - House of Commons Library
    Dec 6, 2024 · On 23 September 2020, the House agreed to make the proxy voting scheme permanent, following the Procedure Committee's review of the pilot ...
  41. [41]
    Necessary baby steps towards The Good Parliament: proxy voting in ...
    Jan 30, 2019 · On 28 January 2019 the House of Commons unanimously voted to implement a trial of proxy voting for MPs on parental leave.<|separator|>
  42. [42]
    Proxy voting in the U.S. House of Representatives: Legislative ...
    New technological developments have heightened interest in understanding and evaluating new tools of participatory and representative engagement in the ...Abstract · Prior literature: A review · Empirical approach and data · Conclusions<|separator|>
  43. [43]
    Understanding Proxy Voting: How It Works and Real-Life Examples
    Aug 16, 2025 · Proxy vote refers to a ballot cast by a single person or firm on behalf of a corporation's shareholder who may not be able to attend a shareholder meeting.What Is a Proxy Vote? · The Process of Proxy Voting · Key Factors to Consider
  44. [44]
    Proxy Rules and Schedules 14A/14C - SEC.gov
    These Compliance and Disclosure Interpretations (C&DIs) comprise the Division's interpretations of the proxy rules and Schedules 14A/C.
  45. [45]
    Proxy Statements and Proxy Solicitation - Perkins Coie
    Regulation 14A of the 1934 Act governs any communication by a public company reasonably calculated to cause a shareholder to grant, withhold or revoke a proxy.<|separator|>
  46. [46]
    [PDF] The Origins and Goals of the Fight for Proxy Access - SEC.gov
    American Bar Association, Report on Proposed Changes in Proxy Rules and Regulations. Regarding Procedures for the Election of Corporate Directors, 59 ...
  47. [47]
    The Universal Proxy Rules Are in Effect: Key Takeaways from ...
    The amendments to Rule 14a-19 of the Securities Exchange Act of 1934 (the “universal proxy rules”) went into effect on September 1, 2022.Missing: regulations | Show results with:regulations
  48. [48]
    2025 Proxy Season Trends: The Pendulum Swings Toward ...
    Mar 14, 2025 · 20 proxy contests conducted under the UPC rules at U.S. companies went to a vote in 2024, compared to 17 contests in 2023. Like 2023, the larger ...Missing: proxies | Show results with:proxies
  49. [49]
    Capital Markets Subcommittee Examines Market Influence by Proxy ...
    Apr 29, 2025 · “Two firms—ISS and Glass Lewis—control 97 percent of the proxy advisory market. That concentration alone would warrant scrutiny. But more ...
  50. [50]
    Attorney General Ken Paxton Investigates Proxy Advisors Glass ...
    Sep 16, 2025 · “Proxy firms like Glass Lewis and ISS too often sacrifice sound financial guidance to advance left-wing political goals, cheating not only ...
  51. [51]
    Concerns Regarding the Proxy Advisor Industry - Congress.gov
    Sep 4, 2025 · Critics argue that ISS and Glass Lewis exert an outsized influence on corporate governance, operate with conflicts of interest, fail to correct ...
  52. [52]
    What's going on with the SEC's proxy advisor rules? - Cooley PubCo
    Sep 12, 2024 · The SEC's 2020 rule that advice from proxy advisory firms was a “solicitation” under the proxy rules.
  53. [53]
  54. [54]
    Proxy Fight: Definition, Causes, What Happens, and Example
    A proxy fight occurs when a group of shareholders join forces and gather enough shareholder proxy votes in order to win a corporate vote.
  55. [55]
    Proxy fight guide: Definition & how to avoid one - Diligent
    Aug 29, 2025 · Learn how proxy fights work, why they occur, how to manage them, and enterprise strategies to prevent them.
  56. [56]
    Lessons from Huntsman's Proxy Fight Victory Over Starboard
    May 1, 2022 · Huntsman's victory marked a rare example where a company successfully prevented a prominent activist hedge fund from winning at least one seat in a proxy fight ...
  57. [57]
    [PDF] NEW EVIDENCE ON THE EFFECTIVENESS OF THE PROXY ...
    The final sample therefore consists of 185 threatened proxy fights for 181 different NYSE- and AMEX-listed firms between 1977 and 1988. Outcomes of the ...
  58. [58]
    The 2025 Proxy Season in 7 Charts - Morningstar
    Sep 23, 2025 · Fewer resolutions and a continued fall in support for environmental and social proposals in proxy-voting season.Missing: universal 2023-2025
  59. [59]
    New Policy Landscape Turbocharges DEI & ESG Activism in 2025 ...
    Feb 25, 2025 · A new analysis reveals that the number of anti-ESG proposals more than quadrupled in the Russell 3000 (from 23 in 2021 to 112 in 2024)Missing: universal | Show results with:universal
  60. [60]
    [PDF] Lessons from the 2024 Proxy Season and Trends for 2025
    Sep 10, 2024 · Governance proposals increased for the first time in recent years while E&S proposals plateaued. • Governance submissions increased by 13%; ...Missing: proxies | Show results with:proxies
  61. [61]
    [PDF] FULL PROXY SEASON - Computershare
    One of the most notable trends for the 2025 proxy season has been the increased number of 'no action' relief granted by the SEC. 'No action' relief was granted ...
  62. [62]
    2025 Proxy Season Review: Four Key Takeaways
    Aug 6, 2025 · These trends include a refocus on governance proposals, a recalibration in support levels for environmental and social proposals, continued ...
  63. [63]
  64. [64]
    Proxy Manipulation or Local Power-Plays? Weighing the Claims of ...
    ... government itself) to advance U.S. interests or undermine Iran's on the political front, arguably a political proxy strategy in all but name. ... definition ...
  65. [65]
    [PDF] A Proposal for Transparency and Accountability in Corporate ...
    government, institutions, and their fellow citizens is near the top ... corporate directors and executives to serve as their political proxies in this way.
  66. [66]
    Proxy War: Introduction Excerpt | Stanford University Press
    I define proxy war as directing the use of force by a politically motivated, local actor to indirectly influence political affairs in the target state. Both ...
  67. [67]
    Proxy Warfare and the Future of Conflict - Taylor & Francis Online
    Apr 28, 2013 · This article defines as conflicts in which a third party intervenes indirectly in order to influence the strategic outcome in favour of its preferred faction.
  68. [68]
    The Strategic Use of Plausible Deniability in Proxy Wars ...
    Feb 20, 2025 · The proxy war that followed is an early post–Cold War example of how states leverage plausible deniability to advance their interests.Missing: rationales | Show results with:rationales
  69. [69]
    The Return of Great-Power Proxy Wars - War on the Rocks
    Sep 2, 2021 · Throughout history, great powers have often competed by supporting proxy forces. The Cold War, for example, was hardly a “long peace” when one ...<|separator|>
  70. [70]
    Hoover Military Experts Chart the History of Proxy Wars, from ...
    Apr 18, 2024 · Major ones included the Korean War, the Vietnam War, the Soviet invasion of Afghanistan, and the Angolan Civil War, but there were dozens of ...
  71. [71]
    [PDF] Proxy Warfare in Strategic Competition: State Motivations ... - RAND
    More specifically, these reports focus on intrastate proxy wars: civil wars in which at least one local warring party receives support from an external state ...
  72. [72]
    War Never Changes: The Enduring Legacy of Proxy Wars and their ...
    Luckily, we have an account of proxy wars and their destructive nature from one of the most technologically advanced societies in history – ancient Greece.
  73. [73]
    A Brief History of Proxy Warfare Part I: Ancient to Modern
    Jan 16, 2024 · The roots of the conflict began in March of 1847 when the Hungarian parliamentarian Lajos Kossuth formed a nationalist government and initiated ...
  74. [74]
    Proxy Wars: The Battlegrounds of the Cold War
    Proxy wars became the primary battlegrounds of the Cold War. Due to the catastrophic risk of nuclear war, both superpowers avoided direct military confrontation ...
  75. [75]
    A Brief History of Proxy War Part II: The Cold War - SpringerLink
    Jan 16, 2024 · This chapter focuses on the Cold War, which set conditions for how proxies are used today. In radically bipolar orders, like the Cold War, the need for the two ...
  76. [76]
    Proxy Warfare in Strategic Competition - RAND
    Mar 9, 2023 · Geopolitical factors, including security and diplomatic concerns, are typically the primary motives. Major powers usually begin to engage in ...
  77. [77]
    Proxy Warfare in the 21st Century: Instruments, Actors ... - CeSCube
    Aug 28, 2025 · Unlike traditional wars, proxy wars allow states to externalise costs and avoid large-scale confrontations. They differ from alliances because ...
  78. [78]
    Game of Proxies – Towards a new model of warfare
    Dec 30, 2020 · Operational pragmatism, deniability, and political flexibility – these are the three most important characteristics that the use of proxies ...<|separator|>
  79. [79]
    Rethinking Proxy Warfare - New America
    Proxy warfare is characterized by a distinctive relationship between a principal-sponsor who delegates some authority over the pursuit of strategic war aims to ...
  80. [80]
    [PDF] Friends with Benefits? Power and Influence in Proxy Warfare
    I argue that the very factors that make proxy warfare appealing to states—its clandestine, informal nature—threaten to undermine governments' abilities to exert.
  81. [81]
    Full article: Comparative proxy strategies in the Russo-Ukrainian War
    Aug 16, 2023 · This article examines the role of strategy in proxy wars, with the goal of identifying relevant findings to proxy wars.<|separator|>
  82. [82]
    No, Ukraine Is Not Fighting a “Proxy War” | RAND
    Apr 30, 2025 · The answer is no. The term “proxy war” is unhelpful in regards to the Ukraine war specifically, and can lead us astray when thinking about other conflicts as ...
  83. [83]
    Expert Comment: This is no proxy war - Russia really invaded Ukraine
    Feb 21, 2023 · This is a real war. Russia really invaded Ukraine and it really has bombed real civilians, real hospitals and real infrastructure.
  84. [84]
    Conflict in Yemen and the Red Sea | Global Conflict Tracker
    Mar 26, 2025 · The intervention of regional powers in Yemen's conflict, including Iran and Gulf states led by Saudi Arabia, also drew the country into a ...
  85. [85]
    The Conflict in Yemen Is More Than a Proxy War
    Jul 21, 2023 · Both Iran and Saudi Arabia have been active in Yemen, taking opposite sides in the war. The Saudis sent their forces into the country as ...
  86. [86]
    Iran's Role in the Yemen War: Real Influence and Regional Gains
    Apr 19, 2024 · It is not a proxy or sectarian war, as often portrayed. While the intense regional competition between Iran and Saudi Arabia fuels the internal ...
  87. [87]
    Conflict in Syria | Global Conflict Tracker
    Oct 3, 2025 · In its 2023 Global Appeal, the United Nations reported that more than 6.9 million are currently internally displaced, with more than 5.4 million ...
  88. [88]
    UNDERSTANDING AGENCY: A PROXY POWER DEFINITION
    Apr 23, 2019 · A relationship is one of agency where the agent has a power to exercise at least one of the principal's own powers. I call this a “proxy power” for short.
  89. [89]
    Understanding Agency: A Proxy Power Definition - SSRN
    Nov 22, 2021 · First, focusing on the agent's proxy power highlights the distinctive idea at the core of agency: that people can act through others at law, ...
  90. [90]
    proxy Definition, Meaning & Usage - Justia Legal Dictionary
    The empowerment or permission to take actions on behalf of someone else. A legal document empowering a person to act as an agent for somebody else.
  91. [91]
    PROXY - The Law Dictionary
    A person who is substituted or deputed by another to represent him and act for him, particularly in some meeting or public body.
  92. [92]
    Agents, Proxies, & Servants – Agency Part 2
    Mar 25, 2024 · When we appoint proxies to act on our behalf we assign them certain rights and responsibilities. Many different types of agents and activities ...
  93. [93]
    Understanding agency: A proxy power definition - ResearchGate
    Aug 6, 2025 · First, focusing on the agent's proxy power highlights the distinctive idea at the core of agency: that people can act through others at law, ...
  94. [94]
    What is Proxy Video — Editing and Post-Production Essentials
    Jul 31, 2022 · A proxy video is a duplicate, transcoded file of a project's source footage that is smaller in data size and lower in resolution than the original video file.
  95. [95]
    Ingest and Proxy workflow - Adobe Help Center
    Aug 22, 2025 · The main purpose of the proxy workflow is to make editing smoother and faster, especially when working with high-resolution or computationally ...
  96. [96]
    'Proxy,' an Exploration of Pathology by Zack Parker - The New York ...
    Apr 17, 2014 · A bizarre puzzle box of twisted passions and psychological sickness, Zack Parker's “Proxy” presents us almost immediately with a scene of such repulsive ...Missing: concept | Show results with:concept
  97. [97]
    Proxy Narrative in The Ambassadors: Reconfiguring James's Ending
    This article discusses what I call the proxy narrative, a type of narrative in which a key scene or plot sequence can be read most meaningfully as a ...
  98. [98]
    Q and A with Dr Dylan Mulvin on Proxies: The Cultural Work of ...
    Aug 24, 2021 · Dr Dylan Mulvin discusses Proxies: The Cultural Work of Standing In, which examines how proxies shape our lives and how we delegate power to ...Missing: concept literature
  99. [99]
    Proxy | The Slender Man Wiki - Fandom
    Proxy (plural: Proxies) is the term given to those who serve The Slender Man. The theory behind the name is that Proxies are entities or people who are ...