I contacted Proton VPN about the TunnelVision exploit and I got a response. I feel great about it, thank you Proton!

Hi,

Thank you for your patience.

Our engineers have conducted a thorough analysis of this threat, reconstructed it experimentally, and tested it on Proton VPN. Please note that the attack can only be carried out if the local network itself is compromised.

Regardless, we’re working on a fix for our Linux application that will provide full protection against it, and it’ll be released as soon as possible.

If there’s anything else that I can help you with in the meantime, please feel free to let me know.

Have a nice day!

  • The Uncanny Observer@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    You will likely never run into any circumstances where the only option you have is to use public WiFi. You don’t even need to use WiFi at all to tether your phone to a PC, the charging cable will allow you to share your mobile data.

    • runswithjedi@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      The exploit is possible because the local network may have a rogue DHCP server overwriting IP routes. If you’re on a mobile network, they are the local network. TunnelVision means a mobile carrier can spy on your VPN traffic now. Unless you run Android.

      • The Uncanny Observer@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Right, which is why most jobs use SSH to access remote data, especially any jobs in the tech sector. VPNs hide your geolocation, they don’t make your data private. This idea that VPNs are some kind of privacy tool is propaganda by VPN companies. You don’t need a VPN except in very specific situations, and any other time you’re just slowing down your connection.