از آنچه من درک می کنم, VPN ایجاد یک تونل امن با رمزگذاری داده های خود را از دستگاه-روتر-ISP من > >-> ارائه دهنده VPN. بنابراین هر کسی میان اطلاعات خود را ببینید می.
نحوه اتصال از سرویس دهنده VPN به سرور وب امن? (گذشته از encyption وب مانند https).
اگر کسی می تواند اطلاعات را از VPN غیر کاربر بین دستگاه خود و ISP رهگیری. چگونه داده ها بین سرور شبکه اختصاصی مجازی و از طریق مسیرهای مختلف به وب سایت رسیدن نیست نگرانی وجود ندارد دولت تونل رمزگذاری بین وب سایت و سرور VPN در متوقف کردن?
Thanks everyone for answering and helping me understand this. Appreciate it!
The traffic all appears to come from the VPN provider, so it’s anonymized data.
With any kind of encryption you have to think about the end points and the information being transmitted. Logins/passwords, CC#’s, SSNs, etc. being submitted to a website need HTTPS to be secure otherwise they will be exposed somewhere in plain text for someone to potentially intercept. You never know the possibilities or odds of the data being compromised so end-to-end encryption is the only sure bet the web server running the site is the sole recipient of your data. TLS correctly implemented guarantees this.
With a 3rd party VPN service, the objectives are a little different. Your ISP can still see the domains you visit (and potentially hijack your DNS queries to better control your access and collect your browsing data), but they can’t see the contents of HTTPS traffic. A VPN encrypts and hides this information from them, but that layer of encryption stops at the VPN provider’s servers. Same basic concept with Tor once your traffic leaves an exit node.
Another use is creating a secure connection over insecure wifi, although HTTPS provides some security guarantees in this situation as well.
There’s more to it than that, but that’s my quick and dirty explanation.