this post was submitted on 26 Feb 2024
32 points (82.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54424 readers
278 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This keeps being said and I don't understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn't it?
Sure, if you can guarantee that the specific program uses the tunnel for the specific connections required.
It is not uncommon for programs to to either not use the tunnel correctly or not use it at all.
While its nice when a program let's you pick the egress interface for its network traffic, split tunneling is still on the host os for handling its route table and making sure that's set up correctly. Like, were people setting up split tunnel networks where they were treating the vpn interface as a proxy, pointing the software at it, and just hoping for the best?