Unable to load image

VPN exploit discovered (that's been possible since 2002) and literally cucks everyone :chadstevejobsgenocide: :marseypenguingenocide: :marseybsodgenocide: except Android enjoyers :marseygigachad:

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user's IP address. The researchers believe it affects all VPN applications when they're connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

( . . . . )

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there's a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

:!#marseygossipsmug: :#marseyglowtyping: :#marseygossipretard:

103
Jump in the discussion.

No email address required.

Holy god android :marseyappicon: bros can we EVER STOP WINNING????

Jump in the discussion.

No email address required.

Are your bubbles blue though?

Jump in the discussion.

No email address required.

hacks u in indian

Jump in the discussion.

No email address required.

Androidcels' data remains safe from any prying eyes who want to listen in on all the discussion about how much s*x they aren't having.

Jump in the discussion.

No email address required.

!codecels iToddlers btfo :marse!#ysmug2:

Jump in the discussion.

No email address required.

Greenbubblecels be seething at bluebubblechads.

Jump in the discussion.

No email address required.

I found it really funny when iCels were all chuffed that they could run emulators on their phones even though I did that on my first Android phone and got bored with it >10 years ago.


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

I installed emus on my Moto Droid X while riding my dinosaur. I still load them all on my latest devices yet never really use them.

Do iKiddies have to root their phones and side load to get emus or something? I can't imagine Apple making deals to charge 30% of apps that are potentially for pirating old games.

Jump in the discussion.

No email address required.

Do iKiddies have to root their phones and side load to get emus or something? I can't imagine Apple making deals to charge 30% of apps that are potentially for pirating old games.

They finally got allowed on the App store due to a ToS change. It was the big hub-bub on twitter for a few days a few weeks ago


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

Imagine their smugness if Apple "invented" an expandable memory port

Jump in the discussion.

No email address required.

I rooted an old iPhone back in the day to play emulators on it. Must've been like an

iPhone 2 or something it was over a decade ago

Jump in the discussion.

No email address required.

>but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks

Sounds like you're not safe either.

Jump in the discussion.

No email address required.

On Linux, Android :marseysnappy: specifically denies it in a hardware level indinig

Jump in the discussion.

No email address required.

Whatever you say greenbubblecel.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.