” من واقعا اشتباه گرفته که چگونه تونن کار، به طور خاص تونن که منطقه خود را پنهان کردن آنچه من می خواهم به ایجاد یک حساب کاربری در حالی که شبکه اختصاصی مجازی فعال است به.
بنابراین در اینجا سناریو: شما فعال شبکه اختصاصی مجازی، آن را به کشور خود را انتخاب تنظیم. شما می خواهید برای ایجاد یک حساب کاربری در وب سایت، اجازه استفاده از Spotify به عنوان مثال (من فقط خوب قدیمی YouTube به MP3، بدون هیچ زحمتی بسیار کمتر: P استفاده)، بنابراین شما را در انجام این کار و از سرویس تشخیص شما می شود در کشور شما VPN خود دو مجموعه ، بنابراین به طور خودکار حساب خود را به آن منطقه تعیین می کند و اجازه می دهد تا شما را به حساب خود استفاده کنید اگر شما در آن منطقه بودند. تا زمانی که ورود شما در حالی که شبکه اختصاصی مجازی فعال، شما نیست مگر اینکه VPN منسوخ شده و یا اشکالات درست بودن در یک منطقه باید مشکوک است؟ و یا در کاملا پتانسیل و عملکرد vpn ها اشتباه گرفته اند
Unless the website has anti VPN systems in place…
It would depend on the quality of the VPN more than anything… fresh unused unblacklisted ip’s are not free 🙂
In order to understand how VPNs change your region, you have to understand a little about how TCP/IP works.
TCP/IP is a protocol stack that is used across the internet. It loosely resembles the OSI model, more information here: https://www.sqa.org.uk/e-learning/HardOSEss04CD/page_12.htm
The two main parts of TCP/IP we are going to talk about are TCP and UDP which are layer 4.
When you normally send or request data on the internet, you have a chunk of TCP or UDP data, and these pieces of data have a “source” and a “destination”.
As a highly simplified example, when you make a request to Google.com normally, Google can see that the request is coming from your IP address because it has to know where the data needs to go. Google then sends you the requested data, and you can see that likewise it is coming from Google.
What a VPN server does is take your Google.com request, and sets itself as the source. This means that Google.com now sees “VPN server wants this data” instead of “TheLichKing274 wants this data” and then the server automagically forwards Google’s response back to you.
There’s a lot of additional detail to how this all works securely, but that is the gist of what is going on and why the destination can’t track the source of the request through regular network traffic analysis.
Now there’s many other ways that services can try to identify your real location. These are known as leaks generally. You can leak through WebRTC in your browser, through IPv6, through DNS, through fingerprinting, through cookies, etc. It is important to harden your browser and settings to prevent these sorts of things from happening.
A good VPN service will typically have protection from many common forms of leaks built into their VPN client, but hardening your browser is a must as well if you want to maintain a reasonable amount of privacy.