This media is not supported in your browser
VIEW IN TELEGRAM
๐คฎ123๐คก43๐ญ12๐คฃ6๐6๐5๐4๐3โค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐คฃ115โค11โก9โ9๐6๐4๐4๐คฏ2๐คก2๐1
Wikipedia
Chicken gun
large-diameter, compressed-air cannon
๐คฃ11๐คฏ9๐ญ4๐2๐1๐ข1๐1
Forwarded from Ministry of good ideas
Good Idea: Be sure to connect to networks you trust when using VPN...
https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/
This "novel" attack is exploiting a vulnerability that has existed for 22 years. The attack, called TunnelVision, tricks VPNs into sending your internet traffic through an unencrypted path, even though you think it's protected. Here's how it works:
1. When you connect to a network, your device asks for an IP address using something called DHCP.
2. The attacker sets up a fake DHCP server on the same network you're on.
3. This fake server tells your device to send its VPN traffic through it instead of the normal, encrypted path.
4. Your device then sends all its internet trafficโincluding the stuff you thought was secureโthrough the attacker's server.
5. The attacker can now see, modify, or even block your traffic, defeating the purpose of using a VPN to protect your privacy.
This exploit makes VPNs ineffective in hiding your online activities, so it's important to be cautious when connecting to networks, especially ones you don't trust.
https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/
This "novel" attack is exploiting a vulnerability that has existed for 22 years. The attack, called TunnelVision, tricks VPNs into sending your internet traffic through an unencrypted path, even though you think it's protected. Here's how it works:
1. When you connect to a network, your device asks for an IP address using something called DHCP.
2. The attacker sets up a fake DHCP server on the same network you're on.
3. This fake server tells your device to send its VPN traffic through it instead of the normal, encrypted path.
4. Your device then sends all its internet trafficโincluding the stuff you thought was secureโthrough the attacker's server.
5. The attacker can now see, modify, or even block your traffic, defeating the purpose of using a VPN to protect your privacy.
This exploit makes VPNs ineffective in hiding your online activities, so it's important to be cautious when connecting to networks, especially ones you don't trust.
Ars Technica
Novel attack against virtually all VPN apps neuters their entire purpose
TunnelVision vulnerability has existed since 2002 and may already be known to attackers.
โ37๐คฃ21๐2โค1๐1
This media is not supported in your browser
VIEW IN TELEGRAM
๐คช69๐ฅ15๐ฅฐ6๐6๐ค3๐3๐2๐2๐คฏ1๐1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ญ91๐36๐คฏ14๐คฃ7๐7๐คฉ5๐4๐ฅ3๐1
Forwarded from Ministry of Doubleplusgood Dope 2๏ธโฃโ๐
๐114๐ฏ19๐18๐ข11๐คฃ6โค2๐2๐1๐1
Forwarded from โ ๏ธInvalid Handle (!kc)
This media is not supported in your browser
VIEW IN TELEGRAM
โค95๐พ8๐5๐ฅฐ4๐1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅฐ58๐28๐14๐12๐คฉ6๐ฅ5โค3๐จโ๐ป3๐คฃ2๐1๐1