Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Typical use cases for tools like this are:

- comply with egress security policies more generally

- comply with rate limits and meters for costly APIs

- monitor outgoing request payloads so nothing sensitive goes over the wire

- caching and deduping large responses

- act as the starting point for adding crawling type workloads

These tend to be pretty limited and special case, and there are lots of other ways of solving each, but sometimes an egress proxy is the thing.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: