TerribleTortoise@lemmy.worldtocute dogs, cats, and other animals@lemmy.ml•Big breasted mourning dove.
121·
6 months agoHUUUUGE … tracts of land!
HUUUUGE … tracts of land!
The addAddress call may just be configuring the local side of the VPN. It’s hard to know without looking at the rest of the code.
The general workflow when establishing a VPN connection is:
addAddress may just be part of the configuration. A very cursory search suggests that OpenVPN may be being used as the underlying VPN implementation framework (not uncommon).
For science: https://www.sciencedirect.com/science/article/abs/pii/S1752928X17301038?via%3Dihub
Edit:
You can’t just post something like that and not a source! Citation required!
You are correct, I had not noticed they did away with that icon until you mentioned it now.
Boeing technicians: “Amateurs!”
The simple answer is yes.
It’s possible to encode or tunnel anything over any protocol.
The next question is why isn’t it done more?
For the above reasons it’s actually more common to see other protocols run on top of http. This is especially common to prevent blocking and censorship by making the traffic look like normal http traffic when it may actually be private messaging apps, file transfers, VPN, etc.