1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-12 10:34:47 +00:00
Files
i18n/i18n/ar/basics/vpn-overview.md
2025-07-23 08:41:49 +00:00

15 KiB

meta_title, title, icon, description
meta_title title icon description
كيف تحمي الشبكات الافتراضية الخاصة خصوصيتك؟ مراجعتنا حول الشبكة الافتراضية الخاصة - دليل الخصوصية مراجعة حول الشبكة الافتراضية الخاصة material/vpn تعمل الشبكات الخاصة الافتراضية على تحويل المخاطر بعيدًا عن مزود خدمة الإنترنت الخاص بك إلى جهة خارجية تثق بها. ينبغي لك أن تبقي هذه الأمور في ذهنك.

الشبكات الخاصة الافتراضية هي طريقة لتوسيع نهاية شبكتك للخروج في مكان آخر في العالم.

:material-movie-open-play-outline: Video: Do you need a VPN?{.md-button}

في العادة، يستطيع مزود خدمة الإنترنت رؤية تدفق حركة الإنترنت الداخلة والخارجة من جهاز إنهاء الشبكة (أي المودم). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the domains you request.

يؤدي استخدام الشبكة الخاصة الافتراضية إلى إخفاء هذه المعلومات عن مزود خدمة الإنترنت الخاص بك، وذلك عن طريق تحويل الثقة التي تضعها في شبكتك إلى خادم في مكان آخر من العالم. ونتيجة لذلك، يرى مزود خدمة الإنترنت فقط أنك متصل بشبكة خاصة افتراضية ولا يرى أي شيء عن النشاط الذي تقوم به عبرها.

ملاحظة

عندما نشير إلى "الشبكات الخاصة الافتراضية" على هذا الموقع، فإننا نشير عادةً إلى المزودين التجاريين لخدمات الشبكة الافتراضية الخاصة (../vpn.md)، الذين تدفع لهم رسوماً شهرية مقابل توجيه حركة المرور على الإنترنت بشكل آمن عبر خوادمهم العامة. هناك العديد من الأشكال الأخرى للشبكات الخاصة الافتراضية، مثل تلك التي تستضيفها بنفسك أو تلك التي يتم تشغيلها بواسطة أماكن العمل والتي تسمح لك بالاتصال بشكل آمن بموارد الشبكة الداخلية/الخاصة بالموظفين، ومع ذلك، عادةً ما يتم تصميم الشبكات الخاصة الافتراضية هذه للوصول إلى الشبكات البعيدة بشكل آمن، بدلاً من حماية خصوصية اتصالك بالإنترنت.

كيف تعمل الشبكة الافتراضية الخاصة؟

تقوم الشبكات الخاصة الافتراضية بتشفير حركة المرور بين جهازك وخادم مملوك من قِبَل مزودي هذه الشبكات لك. من وجهة نظر أي شخص يكون بينك وبين خادم الشبكات الخاصة الافتراضية، فإنه يبدو له الأمر كما لو كنت متصلاً بخادم هذه الشبكات. من وجهة نظر أي شخص يكون بين خادم الشبكات الخاصة الافتراضية والموقع النهائي، كُل ما يمكن رؤيته هو خادم هذه الشبكات متصلاً بموقع الويب.

flowchart LR
 763931["Your Device<div>(with VPN Client)</div>"] ===|"VPN Encryption"| 404512{"VPN Server"}
 404512 -.-|"No VPN Encryption"| 593753(("The Internet<div>(Your Destination)</div>"))
 subgraph 763931["Your Device<div>(with VPN Client)</div>"]
 end

لاحظ أن الشبكات الخاصة الافتراضية لا تضيف أي أمان أو تشفير إلى حركة المرور بين خادم هذه الشبكات والموقع النهائي على الإنترنت. To access a website securely you must still ensure HTTPS is in use regardless of whether you use a VPN.

هل يجب عليَّ استخدام شبكة خاصة افتراضية؟

Yes, almost certainly. تتمتع الشبكة الخاصة الافتراضية بالعديد من المزايا، بما في ذلك:

  1. Hiding your traffic from only your Internet Service Provider.
  2. إخفاء التنزيلات الخاصة بك (مثل التورنت) عن مزود خدمة الإنترنت والمنظمات المناهضة للقرصنة.
  3. يساعدك إخفاء عنوان IP الخاص بك عن مواقع الويب والخدمات التابعة لجهات خارجية على التخفي ومنع التتبع القائم على عنوان IP.
  4. يتيح لك تجاوز القيود الجغرافية على محتوى معين.

VPNs can provide some of the same benefits Tor provides, such as hiding your IP from the websites you visit and geographically shifting your network traffic, and good VPN providers will not cooperate with e.g. legal authorities from oppressive regimes, especially if you choose a VPN provider outside your own jurisdiction.

لا يمكن للشبكات الخاصة الافتراضية تشفير البيانات خارج الاتصال بين جهازك وخادم هذه الشبكات. يمكن لمزودي الشبكات الخاصة الافتراضية أيضاً رؤية حركة المرور الخاصة بك وتعديلها بنفس الطريقة التي يمكن أن يقوم بها مزود خدمة الإنترنت الخاص، لذلك لا يزال هناك مستوى من الثقة التي تضعها فيهم. ولا توجد طريقة بأي شَكلٍ من الأشكال للتحقق من سياسات "تسجيل البيانات" أو "التعقب" الخاصة مزود الشبكة الخاصة الافتراضية.

متى لا تكون الشبكات الخاصة الافتراضية مناسبة؟

Using a VPN in cases where you're using your real-life or well-known identity online is unlikely to be useful. قد يؤدي القيام بذلك إلى تشغيل أنظمة اكتشاف البريد العشوائي والاحتيال، مثلما إذا كنت ستسجل الدخول إلى موقع الويب الخاص بالبنك الذي تتعامل معه.

من المهم أن تتذكر أن الشبكات الخاصة الافتراضية لن توفر لك إخفاء هُوِيَّة مطلق لأن مزود هذه الشبكات نفسه سيظل لديه إمكانية الوصول إلى عنوان IP الحقيقي الخاص بك، ومعلومات الموقع النهائي، وغالباً أيضاً إلى مساراً مالياً يمكن ربطه بك مباشرةً. "No logging" policies are merely a promise; if you need complete safety from the network itself, consider using Tor in addition to or instead of a VPN.

يجب أيضاً ألّا تثق في الشبكة الخاصة الافتراضية لتأمين اتصالك بوجهة HTTP غير مشفرة. In order to keep what you actually do on the websites you visit private and secure, you must use HTTPS. This will keep your passwords, session tokens, and queries safe from the VPN provider and other potential adversaries in between the VPN server and your destination. You should enable HTTPS-only mode in your browser (if it's supported) to mitigate attacks which try to downgrade your connection from HTTPS to HTTP.

Should I use encrypted DNS with a VPN?

Unless your VPN provider hosts the encrypted DNS servers themselves, probably not. Using DOH/DOT (or any other form of encrypted DNS) with third-party servers will simply add more entities to trust. Your VPN provider can still see which websites you visit based on the IP addresses and other methods. All this being said, there may be some advantages to enabling encrypted DNS in order to enable other security features in your browser, such as ECH. Browser technologies which are reliant on in-browser encrypted DNS are relatively new and not yet widespread, so whether they are relevant to you in particular is an exercise we will leave to you to research independently.

Another common reason encrypted DNS is recommended is that it prevents DNS spoofing. However, your browser should already be checking for TLS certificates with HTTPS and warn you about it. If you are not using HTTPS, then an adversary can still just modify anything other than your DNS queries and the end result will be little different.

Should I use Tor and a VPN?

Maybe, Tor is not necessarily suitable for everybody in the first place. Consider your threat model, because if your adversary is not capable of extracting information from your VPN provider, using a VPN alone may provide enough protection.

If you do use Tor then you are probably best off connecting to the Tor network via a commercial VPN provider. However, this is a complex subject which we've written more about on our Tor overview page.

Should I access Tor through VPN providers that provide "Tor nodes"?

You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer.

Currently, Tor only supports the TCP protocol. UDP (used by WebRTC, HTTP3/QUIC, and other protocols), ICMP, and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with ProtonVPN. Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as Isolated Destination Address (using a different Tor circuit for every domain you visit).

The feature should be viewed as a convenient way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual Tor Browser.

Commercial VPN Ownership

Most VPN services are owned by the same few companies. These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use.

You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.==

Our VPN Recommendations{.md-button}

Modern VPN Alternatives

Recently, some attempts have been made by various organizations to address some issues which centralized VPNs have. These technologies are relatively new, but worth keeping an eye on as the field develops.

Multi-Party Relays

Multi-Party Relays (MPRs) use multiple nodes owned by different parties, such that no individual party knows both who you are and what you're connecting to. This is the basic idea behind Tor, but now there are some paid services that try to emulate this model.

MPRs seek to solve a problem inherent to VPNs: the fact that you must trust them completely. They accomplish this goal by segmenting the responsibilities between two or more different companies.

One example of a commercially available MPR is Apple's iCloud+ Private Relay, which routes your traffic through two servers:

  1. Firstly, a server operated by Apple.

    This server is able to see your device's IP when you connect to it, and has knowledge of your payment information and Apple ID tied to your iCloud subscription. However, it is unable to see what website you are connecting to.

  2. Secondly, a server operated by a partner CDN, such as Cloudflare or Fastly.

    This server actually makes the connection to your destination website, but has no knowledge of your device. The only IP address it knows about is Apple's server's.

Other MPRs run by different companies operate in a very similar manner. This protection by segmentation only exists if you trust the two companies to not collude with each other to deanonymize you.

Decentralized VPNs

Another attempt at solving the issues with centralized VPN services are dVPNs. These are based on blockchain technology and claim to eliminate trust in a single party by distributing the nodes across lots of different people. However, many times a dVPN will default to a single node, meaning you need to trust that node completely, just like a traditional VPN. Unlike a traditional VPN, this one node that can see all your traffic is a random person instead of your VPN provider that can be audited and has legal responsibilities to uphold their privacy policy. Multi-hop is needed to solve this, but that comes with a stability and performance cost.

Another consideration is legal liability. The exit node will need to deal with legal problems from misuse of the network, an issue that the Tor network has contended with for its entire existence. This discourages regular people from running nodes and makes it more attractive for a malicious actor with lots of resources to host one. This is a big problem if the service is single-node, as the potentially malicious exit node can see who you are and what you're connecting to.

Many dVPNs are used to push a cryptocurrency rather than to make the best service. They also tend to be smaller networks with fewer nodes, making them more vulnerable to Sybil attacks.