(no title)
morattisec | 1 year ago
I do want to point out that you could deny all traffic except allow a single IP address to test the inverse in a low traffic setting. With a low DHCP lease time it’s feasible that could look like a shaky connection. This is only possible because the kill switches don’t actually disconnect the user.
There’s also mitigation bypasses that are likely to be discovered, we have a few we’re working on.
banister|1 year ago
The firewall rule is 100% sufficient to defend against this exploit. All good VPNs already provide it by default. It's not deep. They're just routes.
Please stop the FUD.
StressedDev|1 year ago
hughesjj|1 year ago
Those are way more impractical but the industry still moved mountains (and killed perf) to mitigate them