<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>backconnect — LowEndSpirit DEV</title>
        <link>https://dev.lowendspirit.com/index.php?p=/</link>
        <pubDate>Thu, 09 Apr 2026 02:26:00 +0000</pubDate>
        <language>en</language>
            <description>backconnect — LowEndSpirit DEV</description>
    <atom:link href="https://dev.lowendspirit.com/index.php?p=/discussions/tagged/backconnect/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>How Is NordVPN Unblocking Disney+?</title>
        <link>https://dev.lowendspirit.com/index.php?p=/discussion/210/how-is-nordvpn-unblocking-disney</link>
        <pubDate>Sat, 30 Nov 2019 02:05:09 +0000</pubDate>
        <category>General</category>
        <dc:creator>Nyr</dc:creator>
        <guid isPermaLink="false">210@/index.php?p=/discussions</guid>
        <description><![CDATA[<p><a href="https://medium.com/@derek./how-is-nordvpn-unblocking-disney-6c51045dbc30" rel="nofollow">https://medium.com/@derek./how-is-nordvpn-unblocking-disney-6c51045dbc30</a></p>

<p>Interesting way used to catch them, using the Akamai header.</p>

<p>Only thing left from the article would be a portscan proving that a big percentage of the listed hosts are webcams, home routers and other insecure IoT stuff. They use a backconnect to route traffic trough compromised hosts, this is common practice in the VPN industry.</p>

<p>I'm of course biased, but think twice before supporting with your wallet this kind of scum.</p>
]]>
        </description>
    </item>
   </channel>
</rss>
