this post was submitted on 13 Aug 2023
52 points (100.0% liked)

Technology

37602 readers
302 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

Tests indicate that every VPN product is vulnerable on at least one device, the researchers say. VPNs for iPhones, iPads, MacBooks, and macOS are extremely likely to be vulnerable, that a majority of VPNs on Windows and Linux are vulnerable, and that Android is the most secure with roughly one-quarter of VPN apps being vulnerable.

you are viewing a single comment's thread
view the rest of the comments
[–] jet@hackertalks.com 7 points 1 year ago* (last edited 1 year ago) (1 children)

Traffic leaking has always been a concern when sitting up a VPN or any network infrastructure. Especially when you're dealing with sensitive data. These concerns are old, and not sensational, new traffic leak discovered in local routing configuration of some VPN clients.

The truly paranoid would have a always-on VPN, no traffic may go outside the VPN, defense in depth. A VM that can only talk to the VPN endpoint. You could use qubes to configure something bulletproof, mullvad even has an article explaining how to do this yourself.

Just out of good hygiene I have leak checks in my computing systems. If they succeed it shuts everything down. Like if you open a browser it checks your external facing IP address. Imagine it's pretty common for people.

[–] adespoton@lemmy.ca 3 points 1 year ago (1 children)

Very few people have functional leak checking set up; personally, I think it should be a built-in OS level function.

[–] jet@hackertalks.com 2 points 1 year ago

It would be nice. But it's a hard problem to solve. To figure out somebody's intense by running a VPN or having certain IP routing rules.

https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/

I do like in this guy day emphasize setting up routing rules so the VPN can only route traffic to VPN endpoints. It's a nice fail safe