1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-25 12:14:24 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-11-27 05:32:13 +00:00
parent 70ff65dbfc
commit 6d140f53b8
2 changed files with 5 additions and 5 deletions

View File

@ -1,5 +1,5 @@
---
meta_title: "How Do VPNs Protect Your Privacy? VPNの概要 - Privacy Guides"
meta_title: "VPNがプライバシーを守る方法について。 VPNの概要 - Privacy Guides"
title: VPNの概要
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
@ -54,7 +54,7 @@ You also should not trust a VPN to secure your connection to an unencrypted, HTT
Unless your VPN provider hosts the encrypted DNS servers themselves, **probably not**. Using DOH/DOT (or any other form of encrypted DNS) with third-party servers will simply add more entities to trust. Your VPN provider can still see which websites you visit based on the IP addresses and other methods. All this being said, there may be some advantages to enabling encrypted DNS in order to enable other security features in your browser, such as ECH. Browser technologies which are reliant on in-browser encrypted DNS are relatively new and not yet widespread, so whether they are relevant to you in particular is an exercise we will leave to you to research independently.
Another common reason encrypted DNS is recommended is that it prevents DNS spoofing. However, your browser should already be checking for [TLS certificates](https://en.wikipedia.org/wiki/Transport_Layer_Security#Digital_certificates) with **HTTPS** and warn you about it. If you are not using **HTTPS**, then an adversary can still just modify anything other than your DNS queries and the end result will be little different.
Another common reason encrypted DNS is recommended is that it prevents DNS spoofing. しかし、ブラウザは既に**HTTPS**で[TLS証明書](https://en.wikipedia.org/wiki/Transport_Layer_Security#Digital_certificates)を確認し、警告しているはずです。 If you are not using **HTTPS**, then an adversary can still just modify anything other than your DNS queries and the end result will be little different.
## Should I use Tor *and* a VPN?