SECURING YOUR CONNECTION: THE ROLE OF SOCKS5 PROXY IN DATA ENCRYPTION