To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
-
Pattern_Juggled
- Posts: 612
- Joined: Sun Dec 16, 2012 6:34 am
-
Contact:
Post
by Pattern_Juggled » Sun Nov 16, 2014 6:09 pm
{direct link: tunception.cryptostorm.ch}
Tunception: tunnelling cryptostorm tunnels
thru other cryptostorm tunnels, and so on recursively. It's
a thing...
Let's discuss.
Cheers,
-
parityboy
- Site Admin
- Posts: 1271
- Joined: Wed Feb 05, 2014 3:47 am
Post
by parityboy » Sun Nov 16, 2014 9:59 pm
@PJ
It's what I call "secure connection layering", effectively placing one VPN connection atop another. Useful when combining CryptoStorm with a less trustworthy/more vulnerable VPN service; CS is always the first connection made. If I ever implement it, it'd be a two-box solution and heavily firewalled to close off leaks.
-
df
- Site Admin
- Posts: 495
- Joined: Thu Jan 01, 1970 5:00 am
Post
by df » Thu Dec 04, 2014 5:16 pm