• 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle





  • If you use HTTPS, the attacker can still see what websites you connect to, they just can’t see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.

    This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.

    If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.


  • Control of the DHCP server in the victim’s network is required for the attack to work.

    This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.

    In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.














  • It’s the language I’m most capable of making a living with. It’s familiar to the point of being boring, I know what popular tools to avoid, I know my way around making Rails get the hell out of the way, turning it into a useful and handy tool.

    I do want a chance at something that’s more exciting though. Some of the features I spy in other languages would be so nice to have.

    Although I’d recently finally had to solve a problem where Ruby being slow was the major factor. Haven’t had that much fun in years. Benchmarks and second degree lap burns will do that to a person.