Otter@lemmy.ca to Technology@lemmy.worldEnglish · edit-28 months agoTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.comexternal-linkmessage-square5fedilinkarrow-up1124arrow-down15file-textcross-posted to: cyberbezpieczenstwocybersecurity@sh.itjust.workscybersecurity@infosec.pub
arrow-up1119arrow-down1external-linkTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.comOtter@lemmy.ca to Technology@lemmy.worldEnglish · edit-28 months agomessage-square5fedilinkfile-textcross-posted to: cyberbezpieczenstwocybersecurity@sh.itjust.workscybersecurity@infosec.pub
Good summary by another user in the crosspost over in !programming@programming.dev: https://lemmy.ca/post/20720943
minus-squareTechnus@lemmy.ziplinkfedilinkEnglisharrow-up11arrow-down1·8 months agoThe fancy transition for every single paragraph as you scroll is unnecessary and distracting.
The fancy transition for every single paragraph as you scroll is unnecessary and distracting.