Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wonder how many corporate networks have end users using things like Zerotier or Tailscale without the admins being aware. Especially running self-hosted where you can use well-known, allowed ports for the control pieces.


Security teams have way more visibility than you seem to be aware of.

My advice to you and others is to always ask yourself, "Is this really worth losing my job over?", when considering any sort of security control circumvention.


>Security teams have way more visibility than you seem to be aware of.

I imagine in the real world, this varies greatly. I've worked in many large, non-tech, companies, and saw a lot of false bravado. They watched some things, but not much. Big companies with zero "deep packet inspection", for example, do exist.

>My advice to you and others is to always ask yourself, "Is this really worth losing my job over?", when considering any sort of security control circumvention.

Good advice, but I wasn't wondering for the sake of trying it. I was wondering in the context of this vulnerability.


Don't really need DPI to detect services and protocol patterns, just a decent perimeter device which almost everyone has.

Ex. Tons of UDP streaming from an endpoint to a cloud box sticks out like a sore thumb using little to no special detection magic.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: