TheQuantumPhysicist

@TheQuantumPhysicist@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

TheQuantumPhysicist,

Nice come back. I bet the herd loves such comebacks when you can’t argue with logic.

If you’re dumb enough to compare something that isn’t tangible or measurable in any way with an economic system that’s been running for thousands of years, then feel free. Ignorance is loved nowadays. It’s the norm. Enjoy the herd’s approval!

TheQuantumPhysicist,

I’ve been managing servers for over 10 years, and I never have felt stupider, and I still don’t understand how to do this. Everyone is making a comment that I don’t understand.

Let’s talk internet 101, and please tell me where I’m wrong.

You make a request to myservice.example.com. The DNS responds to a query giving you an IP address, say 1.2.3.4. Now the client software makes another request to 1.2.3.4:433 (say if we’re attempting to access an https server, binding the SNI address to the SSL/TLS header). The request will be sent to that server, and the server will respond. In what part of all this process can the VPN can do anything?

Normally if you want to access a device through VPN, you make a request to a WHOLE other ip address in another subnet on another (virtual) device locally. It has absolutely nothing to do with 1.2.3.4. It’s something like 10.10.100.X… or similar. How will my domain, myservice.example.com, route to that address, 10.10.100.X? Is it as dumb and simple as routing there? Or is there more to it? It doesn’t sound right to make the DNS server record point to 10.10.100.X.

TheQuantumPhysicist,

Thank you for the clarification. I’ll give that a shot. Cheers!

TheQuantumPhysicist,

The amount of shilling Sync receives makes me worry that something is up with it. It’s not normal that I even believe some bots and sock puppets are involved. I’m not touching it with a long stick until someone does some proper security analysis on it. I’m not dumb to fall for peer pressure. Good luck, guys!

TheQuantumPhysicist,

Security analysis doesn’t require the source code. TikTok was repeatedly analyzed without it being open source.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • osvaldo12
  • magazineikmin
  • khanakhh
  • tacticalgear
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • ethstaker
  • Durango
  • normalnudes
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • cubers
  • modclub
  • everett
  • thenastyranch
  • cisconetworking
  • Leos
  • GTA5RPClips
  • tester
  • vwfavf
  • anitta
  • JUstTest
  • All magazines