Skip Navigation
TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)
  • breaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea.

    to quote the article: "Do not use untrusted networks if you need absolute confidentiality of your traffic" or use HTTPS and a SOCKS5 proxy

  • furry_irl @pawb.social tblFlip @pawb.social
    flathead_irl

    perfectly level.

    0
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TB
    tblFlip @pawb.social

    Keyoxide: https://keyoxide.org/70d44f48bd35a7657aa524b06712beeaaf48a9d6

    Posts 1
    Comments 3