Disclaimer: some of the following if not all could be wrong. Wouldn't it be easier to deal with the credentials side to avoid this problem in the first place? To illustrate what I mean, here's a theoretical idea that while it might be flawed (like potential security failures), could be useful in terms of guidance. When an employee logs in, it sends an email to their company Gmail account complete the login in procedure. They click the link to a Google form which requires them to be logged in to their company Google account for the submitted form to either work or be considered valid. Once, it's submitted, a program will allow them to finish the login process. Also, doing something with a company Google account could be helpful since Google records the devices you logged in with, which if a company can check that, they can see if there is any suspicious devices.
On Wed, Apr 19, 2023 at 10:29 AM Ishak Micheil <[email protected]> wrote: > We're chasing this from data science side as well. As far as charting the > pattern of activity and flag anomalies. > This should trap the subs since he/she won't be checking email, responding > to chat messages etc, or hopefully time of activity could give us clues. > > I do agree, there are many VPN commercial services and they will never > advertise servers properties, besides there's lots of other open-VPN > options. > > We shall conquer! > > On Tue, Apr 18, 2023, 3:21 PM Ted Mittelstaedt <[email protected]> > wrote: > > > > > > > -----Original Message----- > > From: PLUG <[email protected]> On Behalf Of John Jason Jordan > > Sent: Tuesday, April 18, 2023 2:00 PM > > > > >It would be nice if VPN services advertised how effectively they stop > > others from finding out who and where you really are. > > > > They are never going to do this because they are constantly tweaking > their > > proprietary protocols to get around firewalls, and they don't want the > > firewall vendors knowing when they made a change to get past firewalls. > > And given who some of the firewall vendors are, and what they do to > people > > they don't like, this is very understandable. > > > > This stuff is getting very advanced nowadays since many firewalls are > > doing deep packet inspection, and looking specifically for patterns in > > packet traffic that indicate it is VPN traffic encapsulated in regular > http > > or https traffic. So the proprietary vpn clients will modify the > encrypted > > traffic to make it look like regular https traffic. > > > > Never forget that for you, me, and probably all the readers of this list, > > that creating using blocking and messing around with VPNs is really > mainly > > an intellectual exercise, but that there are many people in the world in > > places like Russia and China where a secure VPN means not having people > > breaking their doors down in the middle of the night and hauling them off > > to prison - or worse. > > > > Ted > > > > >
