ehhhhh, if I understand it correctly, this method is effectively DNS poisoning but for a practical use. it wouldn't be without compromise; the proxy provider would potentially be able to see the traffic unencrypted. not a big deal IF you trust the proxy provider I guess.. but poking a hole in something that used to be encrypted sketches me out.
nessssquik
joined 2 weeks ago
the bar is not even on the floor; it's buried within the pits of hell