• PainInTheAES@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 months ago

        Even if they didn’t block it is it worth the risk? Sending mystery traffic home over a government network is always gonna be sus.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 months ago

        Well I guess it is up to you. If it violates your employers policy then don’t do it obviously but you can adjust your VPN to make it hard to differentiate between normal traffic and VPN traffic. It can work in China so it probably can work for you.

        If your that concerned about your work don’t use your phone or at the very least don’t connect to WiFi

    • themelm@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      I’ve had corporate LANs that I couldn’t route around to my wireguard servers from even using netmakers turn server stuff which punches through most shitty lans.

        • themelm@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          9 months ago

          Yes changed ports, I never went too hard on it as im not usually near an office and just used my hotspot for personal stuff.

          Also it’s never a good idea to try too hard circumventing corporate “security”