this post was submitted on 28 Nov 2025
18 points (100.0% liked)

Pulse of Truth

1748 readers
67 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

A 44-year-old man was sentenced to seven years and four months in prison for operating an "evil twin" WiFi network to steal the data of unsuspecting travelers at various airports across Australia. [...]

you are viewing a single comment's thread
view the rest of the comments
[–] Nawor3565@lemmy.blahaj.zone 10 points 3 days ago (1 children)

A VPN would not have helped with this. People connecting to the decoy wifi network were redirected to phishing pages that they willingly gave their info to. HTTPS was still present, the criminal still could not have intercepted information that wasn't input into the phishing page. With a VPN, you would have still been redirected exactly the same way.

[–] piccolo@sh.itjust.works 4 points 3 days ago (1 children)

If the vpn offered its own dns, then it would never used the compromised dns.

[–] Shadow@lemmy.ca 5 points 3 days ago

You generally have to accept the captive portal pages before your vpn connection will be allowed.