this post was submitted on 01 Aug 2025
244 points (98.0% liked)
Technology
73612 readers
3833 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I guess my confusion here comes from trying to reconcile the broad, colloquial understanding of a VPN, and the actual, precise, technical definition.
When a news article runs with VPN in a wide audience usage... 95% of people think SurfShark or Nord or PIA or whatever, something that is consumer oriented, that accesses/fancy proxies the broad internet, as you give in your first example, where it basically functions as a more elaborate set of proxies than what most people could probably manage on their own.
So... yes, it technically is a type 2 VPN as you've listed, but it technically isn't a type 1 VPN, which is what 95% of people think a VPN is.
I've worked remote for a decently long while, and most other remote workers I've known... they do not have really any understanding at all that their work login thing... is fundamentally the same kind of VPN as Surfshark, just configured differently.
My goal was to emphasize this difference, but yeah, I could have used better wording.
And yes, I know as well that Nat Guard CyberSec are by no means the creme de la creme of cybersec specialists, but the fact that a top level Municipal agency went 'oh fuck' and basically escalated the issue to the next level of IT support, the State Nat. Guard... that means they got pretty fucking spooked.
Also, the FBI is involved as well, they'd be the ones to pass it up to NSA and/or Homeland Security, I think... and the Nat Guard would be the ones capable of passing it up to... Army CyberCom... and I think if it makes it up to either Army CyberCom or the NSA or Homeland Sec, well at that point, its theoretically possible that any member of the alphabet soup could be called upon, or at the very least, have it come up on someone's desk.
I am not exactly sure what the CoC of escalation pathways is here, but it seems like this got escalated to as many people as the Municipal Emergency Response Team could, quite rapidly.
Its 'the emergency response team looked at this for 24 hours and then called in another emergency response team'.
Sure. But VPNs were around long before the consumer-oriented VPNs were a thing.
Or they just had one person handling their IT and needed help, and didn't want to pay an outside contractor.
I'm honestly surprised the National Guard was called at all. If anything, that shows how backwards Minnesota is, or at least the mayor of St. Paul. I'd expect that if my state government got hacked, they'd call in a local cyber security firm to come audit things, and we have plenty of them here (I'm in Utah, so not even a big state). This isn't a National Guard situation, it's an independent cyber security audit and FBI situation.
Here's how I expect this happened:
No argument there, you're right.
(technically =P)
Nah, read the links I provided.
It went from the normal IT department, to the city level Emergency Response Team, to the Nat Guard and FBI.
Cities, larger ones anyway ... often have their own sort of local mini-FEMA, who have their own capacities to order around other local agencies, but also have a whole bunch of protocols for... who to contact when something exceeds the capacity of everything they can more or less order around with their own authority.
I am not in particular familiar with St.Paul specifically... but ...
It could overall make sense given the capacities of the city (the Twin Cities, St. Paul + Minneapolis), and them knowing their own constraints.
It could also make sense if they rather rapidly at least suspected a very sophisticated, foreign threat actor.
That second half is kinda most of my argument:
Why would you start up the Military chain of escalation unless you either suspected a potential foreign nation state actor, and/or, critical infrastructure systems were breached, so critical that they'd been previously deemed an actual national security risk, should that happen?
I am not certain of what happened, nor certain of the validity of this logic... but this is my logic, from the original comment.
Sure, they could have just panicked. I don't know that they did or did not.
But I have worked with people who've been employed by, led things like FEMA and DHS and City level emergency response teams, their specialities being the cybersec/netsec variety, and... this seems like actually following a previously outlined set of steps to me.
Ahahah, two things here:
Basically, see what I just wrote above.
Really? Utah, prime recruiting ground for the CIA, Utah, with the largest NSA data center complex in the country, possibly the world, that is archiving essentially all US internal communications they can so they can search through them later if need be, Utah, with more and more corporate datacenters all the time... you don't class Utah as a big state, in terms of the tech sector?
Perhaps I am misunderstanding you, but I just find that silly.