Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Nov 2015 17:01:17 +0000
From:      Paul Stuffins <paul.stuffins@ravexdata.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: VPN security breach
Message-ID:  <56588C5D.90905@ravexdata.com>
In-Reply-To: <CA%2BtpaK39hDp2Gjrd3gXpH3Nn2LSLwpnjsjN2ZgGcV78us7oQ1A@mail.gmail.com>
References:  <20151127104401.7fdfd5fd@Papi> <CA%2BtpaK39hDp2Gjrd3gXpH3Nn2LSLwpnjsjN2ZgGcV78us7oQ1A@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 27/11/2015 15:26, Adam Vande More wrote:
> On Fri, Nov 27, 2015 at 7:44 AM, Mario Lobo <lobo@bsd.com.br> wrote:
>
>> Any comments on this?
>>
>> https://thehackernews.com/2015/11/vpn-hacking.html
>
> Seeing as how it's not Apr 1, I can only assume that site is a clown show.
>
>
Nope, London Trust Media, Inc, the company that provides the VPN 
services at privateinternetaccess.com, paid out $5000 under its Whitehat 
Alert Security Program.

https://torrentfreak.com/huge-security-flaw-can-expose-vpn-users-real-ip-adresses-151126/ 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56588C5D.90905>