Otter@lemmy.ca to Technology@lemmy.worldEnglish · edit-27 months agoTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.comexternal-linkmessage-square5fedilinkarrow-up1125file-textcross-posted to: cyberbezpieczenstwo@szmer.infocybersecurity@sh.itjust.workscybersecurity@infosec.pubprogramming@programming.devhackernews@lemmy.smeargle.fans
arrow-up1125external-linkTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.comOtter@lemmy.ca to Technology@lemmy.worldEnglish · edit-27 months agomessage-square5fedilinkfile-textcross-posted to: cyberbezpieczenstwo@szmer.infocybersecurity@sh.itjust.workscybersecurity@infosec.pubprogramming@programming.devhackernews@lemmy.smeargle.fans
Good summary by another user in the crosspost over in !programming@programming.dev: https://lemmy.ca/post/20720943
minus-squaretblFlip@pawb.sociallinkfedilinkEnglisharrow-up7·7 months agobreaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea. to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy
breaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea.
to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy