You have to open with “Chugga Chugga Choo Choo, we’re all gonna run a train on you!” Or it’s just a plain ole gangbang.
You have to open with “Chugga Chugga Choo Choo, we’re all gonna run a train on you!” Or it’s just a plain ole gangbang.
Full tunnel would not mitigate this attack because smaller routes are preferred over larger ones. So, sure, 0.0.0.0/0 is routed over the tunnel, but a route for 8.8.8.8/32 pointing to somewhere layer2 adjacent, pushed via DHCP option 121, would supercede that due to being more specific.
The Killswitch only checks that VPN is up, not whether traffic is correctly routed over it.
You aren’t wrong, per se, I think you just don’t fully grasp the attack vector. This is related to DHCP option 121, which allows routes to be fed to the client when issuing the ip address required for VPN connectivity. Using this option, they can send you a preferred default route as part of the DHCP response that causes the client to route traffic out of the tunnel without them knowing.
E. It would likely only be select traffic routing out of the tunnel. I could, for example, send you routes so that all traffic destined for Chase Bank ip addresses comes back to me instead of traversing the tunnel. Much harder to detect.
After spending a few minutes mulling it over, I’ve realized the only right move is for me to sell the cube to someone more clever than myself.
Can I only teleport back to where I teleported in from, or can I teleport out of the cube to anywhere I want?
Why didn’t you stick with 3% peroxide to clean it, out of curiosity? Just none available, or am I the only crazy person who does this from time to time?
Sony has had a product like that for over a decade. HMZ-T1
It probably has to do with being native ipv6 and needing to ride a 6to4 nat to reach the broader internet.
Start at 1400 and walk the MTU down by ~50 until you find stability, then id creep it back up by 10 to find the ‘perfect’ size, but that part isn’t really needed if you’re impatient. :)
E. I found 1290 was needed for reliable VPN over an ATT nighthawk hotspot.
The comparison is a little flat when you consider autopilot has minimum viable weather and road condition requirements to activate, no snow or hail, etc, while human drivers must endure and perform optimally in all road and weather conditions.
Latency plays a big role in throughput. If one download target was ‘closer’, i.e. lower latency, it will be able to scale the windowsize higher, therefore allowing more data to flow through for a given connection. Imagine network packets are envelopes and data is paper. Not all envelopes can carry the same amount of paper for a given connection, and the more paper you stuff in your envelope, the faster the transfer completes.
deleted by creator
Don’t worry, the house of cards will finally crumble when they are caught using customer deposits to pay this $4.3BB fine.
Your VPN doesn’t have the ability to strip user agent strings on HTTPS requests, this doesn’t seem VPN related imo.
That last line man. Wow.
Poor girl was in serious distress.
In all weather conditions. Autonomous vehicles only drive in optimal conditions, humans have to suffer whatever nature throws at us.
Important bit:
The North Atlantic Treaty Organization’s move follows Russia’s formal withdrawal from the accord on Tuesday and longstanding Western complaints that Moscow wasn’t honoring the terms of the treaty.
For what it’s worth, I did specifically say ecosystem because the TPM is just one component, which is required to authenticate the remote wipe. Also the drivers are installed automatically with most modern operating systems, it’s not like you install your own south bridge driver, for example. Linux of course notwithstanding.
I’ve seen it used successfully numerous times. Someone steals one of our laptops, rips the drive out, installs vanilla windows, and boom it reboots and performs a wipe.
Regardless, system-on-a-chip are just that, systems; they can absolutely make remote calls without user interaction, just as intimated by the comment you originally replied to.
That really isn’t entirely true anymore since the TPM ecosystem came into existence. I can remotely wipe any pc at my company even if it’s stolen and reformatted because a hardware chip will phone home the second a compatible os is installed and internet access is available.
A lot of negativity around Ubiquity in here, which is surprising to me, honestly. I had their USG for years and loved it, recently swapped it out for the Dream Machine and love it. Really don’t understand the complaints about linking it to the cloud. I just didn’t bother, everything works fine. Additionally, I managed to get a Debian container running on it and installed ntopng, it’s been awesome for getting realtime visibility into my network traffic.
E. I should add I have 6 of their switches and 3 access points, one of which is at least 7 years old and still receiving updates.