واقعا کنجکاو است. ما ارائه دهنده بیش از 50 نقاط مختلف در سراسر جهان ارائه می دهد; با این حال، من همیشه یک محل استفاده می شود. اگر ناشناس ماندن درست پس از برای یک پروژه تحقیقاتی به ارتباط عمیق و تاریک وب و دو سوال کنجکاو من است: 1. گمنامی اضافی مکان های دو (یا بیشتر) را قادر می سازد به طور همزمان، از یک سرور VPN ارائه? چرا یا چرا که نه?
1 دو شبکه اختصاصی مجازی با استفاده از ارائه دهندگان مختلف به طور همزمان، گمنامی اضافی ارائه.?
توجه: بنابراین تمام پاسخ های دقیق (آنها طولانی مجبور شود) قدردانی این نیز به من گزارش نهایی خواهد شد!
It does help a bit. ServerB doesn’t know who requested the site, ServerA doesn’t know what site is being requested
Edit: assuming server A and server B are owned by two different VPN providers
I don’t think it would. Most premium VPN providers use a AES-256-CDC RSA 2048 SHA1 key or greater. This is currently unbreakable, even for quantum computers. Much less some VPNs additionally add perfect forward secrecy which refreshes your encryption every so often. Modern VPNs aren’t beaten by breaking the encryption. They’re beaten by traffic analysis or botnets. My suggestion is if you want extra protection you should run Tor over your VPN. This prevents your ISP from seeing Tor, it also prevents Tor’s guard from seeing you, and you get all the benefits of the onion router. Plus if Tor happens to be compromised with a Javascript exploit or something, your VPN will prevent your real IP from leaking. Or if you have a third party app to connect to the internet while you’re using Tor your real IP won’t leak either. Essentially using Tor over VPN solves the cons of VPN standalone and the cons of Tor standalone.
If you do the following:
1. Have VPN provider No.1 setup on your router for all data in/out of your network.
2. Then use VPN provider No. 2 client on your desktop (or whatever) for data from that device.
If done that way, i’d say yes for sure.
Note, you would probably have a serious performance hit.