minus-squaretblFlip@pawb.socialtoTechnology@lemmy.world•TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)linkfedilinkEnglisharrow-up7·7 months agobreaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea. to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy linkfedilink
breaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea.
to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy