| ▲ | lxgr 2 hours ago | |||||||
Love it when random people tell me whether my use case is legitimate or not without apparently even knowing it exists! Take mobile data connections, for example: Most people don't want to pay for metered (by the byte) inbound traffic they didn't ask for that also drains their battery, but do want to be able to establish P2P connections for lower latency VoIP etc. This is a firewall that's definitionally "not theirs", but that still also serves their interests, yet usually doesn't offer any user-accessible management interface. So may I please traverse this firewall now, or is my use case still illegitimate? | ||||||||
| ▲ | hdgvhicv an hour ago | parent [-] | |||||||
If you are trying to break through a firewall you don’t own then that’s not legitimate. If you are buying firewall as a service then request a user interface or change your service provider. | ||||||||
| ||||||||