Free Open Source Posthumanism
11.1K subscribers
1.39K photos
313 videos
4 files
190 links
Low Tech Low Life

feedback: @fosshplus_v2_bot
Download Telegram
๐Ÿ’ฉ52๐Ÿ˜26๐Ÿคฏ6๐Ÿ‘5๐Ÿคฎ3๐Ÿ–•3๐Ÿคฉ2๐Ÿ˜ญ2๐Ÿ‘1๐ŸŒ1
๐Ÿฅฐ70โค6๐Ÿคฏ5๐Ÿ˜4๐ŸŒ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ™‰59โค25๐Ÿ˜20๐Ÿฅฐ7๐Ÿ™ˆ7๐Ÿ”ฅ4๐Ÿ™Š4๐ŸŒ2๐Ÿฆ„2๐Ÿ‘1
๐Ÿคฌ70๐Ÿ–•43๐Ÿคฃ14๐Ÿคฎ11โค7๐Ÿฅฐ3๐Ÿ’ฉ3๐Ÿคก3๐Ÿคจ3๐ŸŒ2๐Ÿค“2
๐Ÿ˜102๐ŸŽ‰26๐Ÿคฃ18๐Ÿ”ฅ11๐Ÿ˜ญ4๐ŸŒ3๐Ÿ‘2๐Ÿ‘Ž1๐Ÿคฏ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿคฎ123๐Ÿคก43๐Ÿ˜ญ12๐Ÿคฃ6๐Ÿ‘€6๐ŸŒ5๐Ÿ‘Ž4๐Ÿ‘3โค1
๐Ÿซก79๐Ÿ”ฅ14๐Ÿ˜5๐Ÿ˜4๐Ÿคฏ3๐ŸŒ3๐Ÿฅฐ2๐Ÿ™1
๐Ÿคฃ129๐Ÿ‘พ8๐Ÿคฏ4๐ŸŒ2๐Ÿ“1
๐Ÿซก77๐Ÿคฎ31๐Ÿ˜ฑ13๐Ÿค“8โšก4โค4๐Ÿ”ฅ3๐ŸŒ2โœ1๐Ÿ‘1๐Ÿคฏ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿคฃ115โค11โšก9โœ9๐Ÿ‘6๐Ÿ•Š4๐Ÿ™‰4๐Ÿคฏ2๐Ÿคก2๐ŸŒ1
Forwarded from penny newspaper
๐Ÿคฃ87๐Ÿค“23๐Ÿคฏ7
๐Ÿค“101โค16๐Ÿ†12๐Ÿคฃ9๐Ÿฅฐ8๐Ÿ”ฅ5๐Ÿ˜ข5๐ŸŒญ4๐Ÿคจ3๐Ÿ˜2๐ŸŽ„1
๐Ÿคฃ11๐Ÿคฏ9๐Ÿ˜ญ4๐Ÿ‘2๐Ÿ‘1๐Ÿ˜ข1๐ŸŒ1
Forwarded from Ministry of good ideas
Good Idea: Be sure to connect to networks you trust when using VPN...

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

This "novel" attack is exploiting a vulnerability that has existed for 22 years. The attack, called TunnelVision, tricks VPNs into sending your internet traffic through an unencrypted path, even though you think it's protected. Here's how it works:

1. When you connect to a network, your device asks for an IP address using something called DHCP.

2. The attacker sets up a fake DHCP server on the same network you're on.

3. This fake server tells your device to send its VPN traffic through it instead of the normal, encrypted path.

4. Your device then sends all its internet trafficโ€”including the stuff you thought was secureโ€”through the attacker's server.

5. The attacker can now see, modify, or even block your traffic, defeating the purpose of using a VPN to protect your privacy.

This exploit makes VPNs ineffective in hiding your online activities, so it's important to be cautious when connecting to networks, especially ones you don't trust.
โœ37๐Ÿคฃ21๐Ÿ‘2โค1๐ŸŒ1
โœ105๐Ÿ‘€41๐Ÿ”ฅ9โค6๐ŸŒš3๐Ÿ‘2๐ŸŒ1๐Ÿ˜ˆ1
๐Ÿ‘159๐Ÿ—ฟ44๐Ÿฅฐ38โค10๐Ÿ‘5๐Ÿคฎ5๐ŸŽ„3โšก2๐ŸŒ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿคช69๐Ÿ”ฅ15๐Ÿฅฐ6๐Ÿ‘6๐Ÿค”3๐Ÿ’Š3๐Ÿ‘2๐Ÿ‘Œ2๐Ÿคฏ1๐ŸŒ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ญ91๐Ÿ˜36๐Ÿคฏ14๐Ÿคฃ7๐Ÿ–•7๐Ÿคฉ5๐Ÿ‘4๐Ÿ”ฅ3๐ŸŒ1
๐Ÿคฏ68โค12๐Ÿ‘10๐Ÿ˜ฑ5๐Ÿ˜ข4๐Ÿคฎ2๐Ÿ‘พ2๐Ÿ”ฅ1๐Ÿคก1๐ŸŒ1
๐Ÿ˜114๐Ÿ’ฏ19๐Ÿ‘18๐Ÿ˜ข11๐Ÿคฃ6โค2๐ŸŽƒ2๐Ÿ‘Ž1๐ŸŒ1