If you don’t use the VPN for normal things then you leave yourself open to indentification by correlation. It’s the same rule for naive Tor users. The more normal and distributed it appears in traffic, the harder it is to correlate other pieces of data they they already have access to.
Not in my college. They have plenty of IP addresses to not use NAT, i.e. every user gets their public IPv4, and authentication is done with WPA2-Enterprise, i.e. unique login.
Everything is immediately traceable.
If you don’t use the VPN for normal things then you leave yourself open to indentification by correlation. It’s the same rule for naive Tor users. The more normal and distributed it appears in traffic, the harder it is to correlate other pieces of data they they already have access to.
Not in my college. They have plenty of IP addresses to not use NAT, i.e. every user gets their public IPv4, and authentication is done with WPA2-Enterprise, i.e. unique login.
Everything is immediately traceable.