• atx_aquarian@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    5 months ago

    You’d have to cut off VPN, SSH, and proxies, too, and to stop a really slippery network person from getting around that, you’d have to inspect protocol, not just block ports.