Search the Community
Showing results for tags 'compromised'.
Found 2 results
Just wandering what protection AirVPN has against timing correlation attacks on the exit servers like ProtonVPN has called secure-core feature ? https://protonvpn.com/support/secure-core-vpn/ Here's a cut from the article on their site and I apologise if theirs already a thread on this but a quick search didn't give me any results. ProtonVPN’s unique Secure Core architecture allows us to protect our users from network attacks that other VPNs cannot defend against. A classic VPN setup involves a client passing traffic through a VPN server en-route to the final destination. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN.
Hello! I want to start a little discussion about the this topic with you guys here: How to find out if you are compromised (your machines, servers, routers, etc.)? If you suspect to be compromised, what are the first things you are looking for? Sth like: - High RAM/Processor usage, when actually no prog is running - Weird packages in wireshark and other protocol analyzers found - Connection drops, reconnects, timeouts, delays, etc. - Changes on the system you didn't make by yourself - Browser Infiltration (Pop-Up's, Add-on's, long loading-times etc.) I know this topic is really BIG, as there are a lot of different OS's and systems out there. But I like to hear anything and I would appreciate your answers regards, me