I thought by now we’d have seen a fuckton of celebrity deepfake nudes and rule 34 porn of every variety, plus apps that let incels create it from pics of their high school crushes/enemies, but it seems like that tidal wave hasn’t hit yet.
Or perhaps the legal protections arrived just in time to discourage those with the know-how
We wouldn’t need VPNs in the first place (for the modern use cases) except that security and IT guys started blocking or limiting content based on user IP address.
That needs to stop entirely, it’s a defective feel good security measure that is easily defeated by an attacker willing to spend a few bucks for a new IP.
Fortunately VPN tech is very flexible, so there are ways to get yourself a dedicated IP that nobody else can use, solving the problem and defeating those IT guys.
Yes, that may be the answer. But blocks of IPV6 can still be limited by entire subnets if security/cloud host/IT guys keep turning to this method of reducing their exposure to bad actors.
It totally had its time and place, but it’s trivial to get “fresh IPs” from 4G VPN and proxy services that specialize at this (for a price), so as a security concept it’s only viable if your attacker’s budget is under $20.
Been with Mullvad a long time and it has been an excellent service.
As they have grown, their IP pools are no longer as fresh and I get Google captcha’d on hardmode, or cloudflare blocked, or other account limitations when using the service that didn’t used to be there all the time now.
I wish the VPN community had a way to solve for this.
Websockets are often used for quality of life features like notifications and websites that are dynamic without needing to be refreshed. Almost went website with any kind of chat will use WS for example. Turning it off will make web browsing a little more annoying.
However websockets are also sometimes used for anti-fraud related software that can also leak information you may deem private. Disabling websockets might prevent that data from getting out but of course all this depends on your threat model.