@ceresbzns @delroth
Ha, I always wondered how people accomplish source IP spoofing so that packets can reach their destination.
Interesting read; thanks for sharing.
Where I read more about bcp38 http://www.bcp38.info/index.php/Main_Page
=> More informations about this toot | View the thread | More toots from INIT6@infosec.exchange
=> View ceresbzns@infosec.exchange profile | View delroth@delroth.net profile
text/gemini
This content has been proxied by September (3851b).