The authors also have recommendations for VPN servers and service providers. They suggest that VPN providers randomize source port selection, prevent clients from using the VPN server’s listening port as a source port, and limit concurrent VPN connections. From a user perspective, they should connect to private VPN servers to which only they have access, or use a non-vulnerable encryption protocol.
this post was submitted on 22 Nov 2024
6 points (100.0% liked)
Cyber Security
65 readers
2 users here now
🕵🏿 Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. 🕊️
founded 7 months ago
MODERATORS