OttertoTechnology@lemmy.worldEnglish·5 months agoedit-25 months agocross-posted to: cybersecurity@sh.itjust.worksprogramming@programming.devTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)(www.leviathansecurity.com)external-linkarrow-up1125arrow-down16message-square5file-textfedilink
arrow-up1119arrow-down1external-linkTunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)(www.leviathansecurity.com)OttertoTechnology@lemmy.worldEnglish·5 months agoedit-25 months agocross-posted to: cybersecurity@sh.itjust.worksprogramming@programming.devmessage-square5file-textfedilink
Good summary by another user in the crosspost over in !programming@programming.dev: https://lemmy.ca/post/20720943
minus-squareTechnusEnglisharrow-up12arrow-down1·5 months agolinkfedilinkThe fancy transition for every single paragraph as you scroll is unnecessary and distracting.
The fancy transition for every single paragraph as you scroll is unnecessary and distracting.