minus-squaretblFlip@pawb.socialtoTechnology@lemmy.world•TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)linkfedilinkEnglisharrow-up7·7 months agobreaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea. to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy linkfedilink
tblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agoWTF DJI, UAV CTF?!plus-squaremedia.ccc.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWTF DJI, UAV CTF?!plus-squaremedia.ccc.detblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agomessage-square0fedilink
tblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agoChrome now ships with a user-tracking ad platform baked inplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChrome now ships with a user-tracking ad platform baked inplus-squarearstechnica.comtblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agomessage-square0fedilink
tblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agoDemystifying eSIM Technologyplus-squaremedia.ccc.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDemystifying eSIM Technologyplus-squaremedia.ccc.detblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agomessage-square0fedilink
tblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agoIntel Arc drivers now ship with telemetry enabled by defaultplus-squarewww.techpowerup.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntel Arc drivers now ship with telemetry enabled by defaultplus-squarewww.techpowerup.comtblFlip@pawb.social to Furry Technologists@pawb.social · 1 year agomessage-square0fedilink
breaking news: researchers discover that network protocols work as intended. mindlessly connecting to an untrusted network is still a bad idea.
to quote the article: “Do not use untrusted networks if you need absolute confidentiality of your traffic” or use HTTPS and a SOCKS5 proxy