Remove Encryption Remove IP Address Remove Protocol
article thumbnail

Enhancing the security of WhatsApp calls

Engineering at Meta

Protect IP Address in Calls” is a new setting on WhatsApp that helps hide your location from other parties on the call. Then in October 2023, WhatsApp began rolling out “Protect IP Address in Calls” which hides your IP from the other party by relaying calls through WhatsApp Servers.

article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

It’s interesting to observe how encryption and network performance monitoring (NPM) have evolved over time. Encrypted passwords came along as did token authentication. But, this goal gets harder and harder as more and more encryption gets introduced and more services move to the cloud. It’s encrypted HTTPS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to find applications with NetFlow

Kentik

You can also learn about the protocols in use, the ports being used, the top interfaces, etc. Source IP address. Destination IP address. IP protocol. Source port for UDP or TCP, 0 for other protocols. Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols.

article thumbnail

TVS Supply Chain Solutions built a file transfer platform using AWS Transfer Family for AS2 for B2B collaboration

AWS Architecture

To meet its customers compliance requirements, TVS SCS sought a reliable file transfer solution supporting Applicability Statement 2 (AS2), a business-to-business (B2B) messaging protocol. Business use case Several end customers in the manufacturing sector mandated the exchange of EDI documents through the AS2 protocol over the internet.

B2B 119
article thumbnail

NPM, encryption, and the challenges ahead: Part 2

Kentik

In part 1 of this series, I talked a bit about how encryption is shaping network performance monitoring (NPM). Using BGP, public IP addresses can be associated with a business’s Autonomous System, but this doesn’t always reveal the actual application (e.g., Let’s dive in deeper now…. AWS currently hosts Intuit’s TurboTax).

article thumbnail

Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”)

CATO Networks

Researchers have labeled this technique ‘decloaking’ as while the VPN tunnel remains connected, it allows attackers to trick many VPN clients into sending traffic via a side channel and not through the encrypted tunnel. Traffic flows through the side channel unencapsulated and can be snooped by an attacker.

VPN 52
article thumbnail

Gathering, Understanding, and Using Traffic Telemetry for Network Observability

Kentik

Detecting malware and DDoS attacks You can detect malware and DDoS attacks by looking for unusual traffic volumes, unexpected traffic destinations or sources, or abnormal protocol usage. Then, correlate that data with information such as IP addresses, MAC addresses, and device names.

Network 111