“We recently announced the completion of our migration to remove all traces of disks in use on our VPN infrastructure.”
“Today we can announce more steps forward - our Encrypted DNS service has also been converted to run from RAM!”
“We recently announced the completion of our migration to remove all traces of disks in use on our VPN infrastructure.”
“Today we can announce more steps forward - our Encrypted DNS service has also been converted to run from RAM!”
Yes, that may be the answer. But blocks of IPV6 can still be limited by entire subnets if security/cloud host/IT guys keep turning to this method of reducing their exposure to bad actors.
It totally had its time and place, but it’s trivial to get “fresh IPs” from 4G VPN and proxy services that specialize at this (for a price), so as a security concept it’s only viable if your attacker’s budget is under $20.