May 7, 2024, 3:32 p.m. | Bruce Schneier

Schneier on Security www.schneier.com

This attack has been feasible for over two decades:


Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.


TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the …

applications attack cyberattack encrypted network private private network protect researchers send snooping tampering traffic tunnel virtual virtual private network vpn vpns

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya

Security Analyst SOC (m/w/d)

@ Deutsche Telekom | Bonn, Deutschland