Date: Fri, 27 Nov 2015 17:01:17 +0000 From: Paul Stuffins <paul.stuffins@ravexdata.com> To: freebsd-questions@freebsd.org Subject: Re: VPN security breach Message-ID: <56588C5D.90905@ravexdata.com> In-Reply-To: <CA%2BtpaK39hDp2Gjrd3gXpH3Nn2LSLwpnjsjN2ZgGcV78us7oQ1A@mail.gmail.com> References: <20151127104401.7fdfd5fd@Papi> <CA%2BtpaK39hDp2Gjrd3gXpH3Nn2LSLwpnjsjN2ZgGcV78us7oQ1A@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 27/11/2015 15:26, Adam Vande More wrote: > On Fri, Nov 27, 2015 at 7:44 AM, Mario Lobo <lobo@bsd.com.br> wrote: > >> Any comments on this? >> >> https://thehackernews.com/2015/11/vpn-hacking.html > > Seeing as how it's not Apr 1, I can only assume that site is a clown show. > > Nope, London Trust Media, Inc, the company that provides the VPN services at privateinternetaccess.com, paid out $5000 under its Whitehat Alert Security Program. https://torrentfreak.com/huge-security-flaw-can-expose-vpn-users-real-ip-adresses-151126/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56588C5D.90905>