this post was submitted on 29 Jul 2025
1015 points (99.0% liked)

Technology

73423 readers
4340 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

"If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

you are viewing a single comment's thread
view the rest of the comments
[–] skisnow@lemmy.ca 33 points 1 day ago (1 children)

VPNs are one of the core security measures of all large companies.

VPNs aren't just a "hide your IP" tool, they're a way of giving someone access to an organisation's internal network. Sensitive servers such as databases, wikis, scheduling tools etc don't have publicly exposed IPs, they only have connections that are accessible from inside that VPN. See also https://en.wikipedia.org/wiki/Defense_in_depth_(computing)

[–] Blemgo@lemmy.world 8 points 18 hours ago

Not only that, but they are crucial for network security. VPNs allow all network traffic (with a few necessary exceptions) to be routed through the company's network and benefit from its security measures, mainly monitoring traffic for suspicious and malicious behaviour. Without it, finding compromised PCs is much harder and enforcing company policies regarding web use would be impossible outside the office.