Quote:
Originally Posted by mrmistoffelees
Not necessarily, SH3 had a vulnerability for a few months whereby peoples ‘real’ ip addresses have been obtained whilst using VPN’s
VPN’s don’t offer the level of security that most people believe
|
There's a big difference between what is possible if somebody goes to enough lengths and that which is exposed simply by using a P2P system.
With P2P systems you "advertise" that you have parts of an item, from which others can download from you. That is what these cases look out for. They don't do an in-depth investigation.
By "advertising" that people can also download parts from you,
you are effectively issuing copies of that item. That is the aspect that's causes these issues, not simply the downloading part of the system.
---------- Post added at 11:37 ---------- Previous post was at 11:17 ----------
Quote:
Originally Posted by mrmistoffelees
|
They still have to go to a lot of trouble to target an individual, and might get into trouble themselves for doing it.
Quote:
Researchers were able to mount a DNS rebinding attack that revealed a VPN user’s IP address “by [the user] simply visiting a [malicious] webpage for a few seconds”, reads a blog post drafted by Fidus in March but eventually published last week.
DNS rebinding attacks weaponize a victim’s browser by making it a proxy for attacking private networks.
|
If I'm reading it right, it can only work if the user can be persuaded to visit particular websites that are "infected" with this exploit. How likely is that?