shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

291
active users

#remoteaccess

0 posts0 participants0 posts today

#STS Scholars for Remote Access and Financial Fair Play!

We call on #ScienceAndTechnologyStudies (@sts) scholars advocating for #RemoteAccess and #Financial #FairPlay to sign this petition.

We demand STS communities to
1. provide remote access, ensure hybrid participation possibilities
2. make costs of future STS conferences& associations transparent.

change.org/p/sts-scholars-for-

Change.orgSign the PetitionSTS Scholars for Remote Access and Financial Fair Play!
Replied in thread

@deepthoughts10 I can’t see the original post anymore. I was probably too harsh and got blocked… happy to have this discussion but I’ll probably stop tagging @chrismerkel after this one.

So basically IIRC the original post was something along the lines that it’s hard to distinguish legitimate users from attackers because everyone’s using VPNs, so ban access from consumer #VPN.
Which to me is basically the same as saying you should ban #encryption because bad guys use encryption.

As to your question, #remoteaccess to the business network and services should only be done through the corporate VPN (or other authenticated access). You shouldn’t have corporate services (other than VPN/remote access) accessible from *anywhere* outside of the corporate network. So I assumed the OP was referring to customers or users.

Banning VPN access is not an effective way to prevent attacks because attackers can use many other techniques to obscure their IP address not just VPNs. For example using a VPS or other cloud service. There are even ways to get legitimate residential IP addresses.

Preventing attacks is pretty complex and it really depends what sort of attack you’re trying to block, but in general attackers behave differently from users. Detecting and blocking those behaviours is more effective than trying to block tools like VPNs.

What are your thoughts?