top | item 30695336

(no title)

willstrafach | 4 years ago

How would that work? Connections are mainly peer-to-peer with Tailscale. An attack (I suppose pushing new key pairs to specific peers and pointing them through a malicious endpoint?) would likely require a very noisy and detectable process.

discuss

order

No comments yet.