Session Hijacking and Sidejacking in 2026: How Sessions Are Stolen and How VPNs Protect Your Accounts
Content of the article
- What is session hijacking and why it still matters in 2026
- How session cookies and access tokens get stolen
- Vpn vs. session theft: what actually protects, and where it can’t help
- How to choose and configure a vpn to block sidejacking
- Site-side measures: building sessions that are hard to steal or replay
- Behavioral hygiene: habits that defeat sidejacking better than any "antivirus"
- Cases: from the legendary firesheep to real incidents 2024–2026
- Testing and audits: how to safely simulate attacks and plug holes
- 2026 trends: a world beyond passwords, but still sessions
- Checklists and step-by-step guides: quick wins for peace of mind
- Where vpn can't help and how to cover these gaps
- Summary: a simple strategy against complex attacks
- Faq: quick answers to the most common questions
What Is Session Hijacking and Why It Still Matters in 2026
A Session Is Like a Key to Your Apartment: A Simple Metaphor, a Complex Reality
Let's be honest: we log in to a website once and then browse without entering our credentials again because the browser holds a session token. This token might be a cookie, a server ID, or a bearer token that confirms "it's you again." Convenient? Absolutely. Risky? Definitely. Because if someone copies that token, they can impersonate you as long as the session lasts. No password or SMS code needed. Just a door key you accidentally dropped.
A session token isn’t just a random string. It’s your ticket into your account. Most services keep these tokens alive from 15 minutes up to several days. The bad news: tokens often leak through networks or browser vulnerabilities. The good news: we’ve learned how to make life much harder for attackers. And yes, in 2026 this issue is still relevant — security has improved, but attacks have become craftier.
Sidejacking vs. Hijacking: Two Roads to the Same Takeover
You’ve probably heard of session hijacking — taking over the entire session. But there’s also sidejacking, where an attacker snatches the token or part of the traffic from the sidelines without breaking the entire channel. In hijacking, the attacker can meddle with the connection, tamper with responses, and steal everything in sight. With sidejacking, just catching a single session cookie on the fly is enough to get inside the account. It may seem subtle, but the result is the same: access without a password.
Sidejacking used to be child’s play on open networks: just start a sniffer and grab an unencrypted cookie. Today, almost everything runs on HTTPS. But “almost” isn’t “all.” Even with HTTPS, scenarios like mixed content, misconfigured subdomains, vulnerable extensions, XSS, and improper cookie flags persist. And people are human — they make mistakes and click where they shouldn’t. Attackers exploit that.
Why This Still Works Now: Convenience Comes With Compromises
We want one-click access — and we want it fast. We demand quick loading on mobile, stable work behind corporate proxies, and seamless SSO. These needs push teams to make compromises: long token TTLs, aggressive caching, domain separation for static content, complex redirects, and legacy configuration “baggage.” In 2026, trends like Passkeys, ECH, and mandatory HTTPS truly shrink the attack surface. But sessions continue to live in browsers, devices, and app memory. As long as access tokens exist, there will be attempts to steal them.
How Session Cookies and Access Tokens Get Stolen
Public Wi-Fi and Sniffing: When the Airwaves Turn Against You
Open Wi-Fi is like chatting in a packed subway car — quiet, but everyone hears you. If a site loads resources or APIs without TLS, if it uses an old login endpoint, or if HTTPS redirects are sloppy, a sniffer can catch your token. In 2026, most sites are fully encrypted, but even a single non-TLS layer can trip you up. Plus, client isolation on routers is often disabled, especially in cafés and hostels, leaving 20-30% of open networks with vulnerabilities, according to pentesters.
Add the “evil twin” — fake access points with similar names. People rush, phones auto-connect, and suddenly traffic flows through an attacker’s device. Even if the main page is HTTPS, a helper call, an image from a third-party domain, or an exposed tracking pixel could leak enough info for an attack. Sometimes, a single careless click is all it takes to hijack sessions—especially if cookies lack the Secure flag or the app supports weak backward compatibility.
MITM: ARP Spoofing, DNS Spoofing, and TLS Stripping
Man-in-the-Middle attacks didn’t disappear; they just evolved. ARP spoofing reroutes local network traffic through the attacker’s device. DNS spoofing feeds fake responses, redirecting you to counterfeit domains. TLS stripping attempts to downgrade encryption, leaving you on HTTP — especially if HSTS isn’t properly configured. The goal in every case is the same: to see or alter what should remain hidden.
Smart configurations make MITM harder but don’t eliminate it. Many companies rely on microservices, external CDNs, and third-party widgets. Sometimes HSTS is missing on an auth subdomain; sometimes a test page still uses an old protocol. If a session token leaks just once, attackers gain full access.
Phishing, XSS, and Malware: Stealing Right Inside the Browser
Network defense is only half the story. The other half happens inside browsers and devices. Phishing sites have become convincing. They don’t always target your password—they sometimes trick you into acting while logged in, extracting tokens via XSS or malicious scripts. HttpOnly flags help but don’t block all attacks. If the attacker can make authenticated requests from your session, it’s as if "you" sent them.
Malicious browser extensions, accidentally installed “boosters,” open-source crypto miners with shady histories — all potential token leak sources. Add keyloggers and ad injectors that invisibly swap page content. In that environment, every cookie is a tasty target, every bearer token a jackpot.
VPN vs. Session Theft: What Actually Protects, and Where It Can’t Help
Encrypting Traffic: From Point A to B Without Peeking
VPN encrypts all your traffic before it leaves your device. Even if Wi-Fi is open, even if the network admin "sees everything," the packet contents look like encrypted gibberish to outsiders. This makes sidejacking on public networks much harder: sniffers can’t grab cookies, tokens, or URLs. Protocols like WireGuard and OpenVPN with modern ciphers (ChaCha20-Poly1305, AES-256-GCM) close “holes” between you and the VPN server.
Understand the boundaries: VPN creates a secure tunnel between your device and the VPN provider’s exit point. From there, traffic proceeds to the website. If the site uses HTTPS, that adds a second encryption layer. Together, it’s powerful. Sniffing traffic on local networks becomes pointless. This is precisely where VPN shines in preventing sidejacking.
Where VPN Helps and Where It Doesn’t
Let’s be honest: VPN is not a silver bullet. It nearly eliminates interception risks in local networks and blocks most MITM attacks on untrusted Wi-Fi. But it’s powerless if the token is stolen inside the browser via XSS, malicious extensions, or phishing. VPN won’t fix bad cookie flags on the site’s side, won’t stop an app from sending your token to a third party, and won’t undo a careless click.
The honest strategy? VPN plus HTTPS and strict cookie policies, combined with user discipline and robust backend protections. This three-pronged approach works. Each part alone is weaker or even useless against modern attacks.
Keeping Pace in 2026: ECH, HTTP/3, and Compatibility
Good news: the new tech stack helps. HTTP/3 over QUIC reduces some TCP-level attack risks and speeds up reconnects. Encrypted Client Hello (ECH) hides destination domains in the TLS handshake so prying network watchers can’t see SNI. For us, this means fewer metadata leaks and harder targeted MITM attacks. VPN and HTTP/3 work well together, and modern clients enable them by default. Fewer side-channel leaks make stealing sessions based on traffic patterns tougher.
Additionally, all major browsers have strengthened cookie protections: site partitioning, CHIPS/partitioned cookies, strict SameSite, and Secure priority. Legacy scenarios remain but are rarer in production. Overall, we’re moving toward sessions tightly tied to context and devices—not fluttering labels in the wind.
How to Choose and Configure a VPN to Block Sidejacking
Selection Criteria: Not All VPNs Are Equal
Key signs of a trustworthy service in 2026 include: modern protocols (WireGuard, IKEv2, OpenVPN) with strong ciphers; transparent privacy policies and independent code audits; built-in kill switch blocking traffic if the tunnel drops; protection against DNS/IPv6 leaks; cross-platform support; and reasonable latency to your services. If a provider hides audits, dodges legal jurisdiction, or uses vague language — be skeptical. Better to walk away.
Another key factor: a reliable mobile client with stable reconnect, Always-On VPN support, low battery usage, and smooth split tunneling (or ideally none). Overly “feature-packed” clients with a thousand toggles often deliver chaos. We want security and predictability—not a fireworks show of switches.
Setup Without Surprises: Kill Switch, No Split, Own DNS
Always enable the kill switch. This ensures your traffic never leaks onto an open network if the tunnel breaks. Disable split tunneling for sensitive apps—route all traffic through VPN, especially login and API calls. Configure a trusted DNS within the tunnel to avoid exposing requests to your ISP or network admin. Enable obfuscation (stealth mode) when possible, so VPN traffic looks like regular HTTPS—useful in filtered networks.
Check IPv6 — some clients bypass the tunnel for IPv6 traffic, risking leaks. Enforce a unified policy: all traffic through VPN, or none. Also, set auto-start: phone wakes up, VPN connects; laptop lid opens, tunnel’s ready. Small details often prevent embarrassing breaches.
Home Router, Corporate Gateway, or Your Own Server
If you work from home often, consider running VPN on your router. That way, all devices—IoT, consoles, TV—are automatically tunneled. For companies, a centralized VPN gateway with policies, segmentation, and Zero Trust overlay makes sense. Alternatively, run your own VPS with WireGuard. Pro: full control and predictable exit IPs. Con: responsibility for updates, config, and monitoring. Still, any of these is a big upgrade over “no VPN” for sidejacking protection in cafés.
Site-Side Measures: Building Sessions That Are Hard to Steal or Replay
Correct Cookie Flags and Policies
If you run a service: set Secure and HttpOnly flags on all session cookies. Apply a strict SameSite=Lax or Strict where possible. Consider using __Host- and __Secure- prefixes for key tokens so browsers enforce extra rules. Don’t mix static content and authentication on the same domain unnecessarily; if you do, enable HSTS and avoid mixed content.
Pay special attention to subdomains: different “kitchens” get different domains. Restrict cookie Path so tokens don’t travel where they’re not needed. Make sure session lifetimes are reasonable. Week-long sessions look friendly but hurt security. Fifteen-minute sessions feel too harsh for consumer services. Find the right balance and support it with "silent" renewal during active use.
Token Rotation, Short TTLs, and Context Binding
These days, short-lived access tokens (5–15 minutes) paired with refresh tokens protected by cookies are common. Rotate refresh tokens with each use and invalidate all tokens immediately if suspicious activity occurs. Bind sessions to devices and context: key fingerprints, mTLS for critical panels, DPoP in OAuth 2.1, request signatures. You don’t need mTLS for every user, but it’s great for admin and internal tools.
Avoid storing tokens in localStorage—it’s exposed to JavaScript and vulnerable to XSS. HttpOnly cookies combined with strict Content Security Policy and domain isolation form a much stronger barrier. Add replay protections: nonces, one-time codes for sensitive actions, contextual checks on IP/ASN, time, and platform.
Protection Against Session Fixation and Vulnerable Redirects
Session fixation happens when attackers force a known session ID onto a user, then hijack that session. The fix: regenerate session IDs after login and privilege changes. Eliminate open redirects that forward users to external domains while preserving sessions. Enable HSTS on root domains and critical subdomains, with preloading. These steps block "practice" attacks and foil TLS-stripping attempts.
Don’t forget breach reports: CSP reporting, Expect-CT (though aging), and browser error logging. The sooner you spot errant scripts or unexpected initiations, the less likely your tokens leak in production.
Behavioral Hygiene: Habits That Defeat Sidejacking Better Than Any "Antivirus"
Simple Rules for People, Big Obstacles for Attackers
Public Wi-Fi? Connect VPN first, then log in. No VPN? Use a mobile hotspot. Don’t auto-connect to "known" networks. Turn off Wi-Fi when idle. It sounds basic but cuts half the risk. We often check mail, bank, or corporate portals on the go—take a second pause to confirm your VPN shield is active.
Don’t keep credentials "just in case" on shared computers. Use separate browser profiles for work and personal. Extensions? Fewer is safer. Two or three trusted ones is good. Ten random ones? Bad idea. And please, disable "pirate video boosters" and free "ad blockers" from shady sources. They often steal data.
Two-Factor Authentication and Session Lockdown
2FA doesn’t stop an already stolen session token but makes attackers’ re-entry harder. That buys you time to spot suspicious activity and log out all sessions. Link your account to an authenticator app, not SMS. Enable notifications for logins from new devices or locations. See something odd? Immediately log out all devices and change your password.
Companies benefit from adaptive authentication: require re-verification on sudden IP shifts, suspicious user agent changes (new browser, unknown OS build), or high-risk actions. Let stolen sessions hit a contextual wall.
Monitoring and Incident Management for Teams
Authorization, session, and activity logs are gold. Capture client fingerprints, app versions, token lifecycles. Set alerts for unusual patterns: “session jumped half the globe in a minute,” “one refresh used from multiple ASNs,” or “massive admin access attempts.” You'll catch wandering tokens and have time to shut them off.
Fast token invalidation is key. Automated. No manual database cleanups. The system should kill stolen sessions in seconds upon detection. Pre-plan response scenarios: who has the rights, where’s the button, what to tell users, which metrics to monitor afterward.
Cases: From the Legendary FireSheep to Real Incidents 2024–2026
A Classic Tale: Open Networks, Mixed Content, and Hijacked Feeds
This story is as old as time. User sits in a café, opens a popular portal. Some resources load via HTTP because “that’s how it’s been.” The interceptor waits, then quietly inserts the cookie into their browser. Bam — feed, messages, files — all there. How is this possible in 2026? Sadly, it still happens. Especially on secondary subdomains and internal dashboards "left untouched" for years.
The takeaway: legacy setups are the enemy. Shiny on top, rusty bolts underneath. Domain inventory, mixed content scans, HSTS with preload — these fix the problem. Meanwhile, VPN in public networks acts like a seatbelt: it doesn’t guarantee you won’t crash, but reduces the chance of serious injury.
Corporate Phishing and Admin Token Theft
Another case: an admin receives an email or message leading to a panel clone—with one difference: a hidden script grabs tokens from storage and sends them to attackers. No login needed. The admin stays logged in, the script works silently, the token is gone. Next, attackers create integrations, export data, change keys, and try to settle in.
Lessons? HttpOnly, strict CSP, secret encryption, blocking dangerous browser methods, and least privilege. Plus monitoring: spot suspicious API calls from odd IPs? Instantly revoke all admin sessions and rotate keys. 2FA won’t help stolen tokens but stops fresh break-ins.
Mobile Messenger and the "Innocent" Backup
Mobile apps sometimes store refresh tokens in backups, which sync unencrypted to the cloud. Losing the device or a weakly protected cloud account leaks tokens. This grants long-term, quiet, hard-to-detect access. In 2026, many platforms tightened backup policies, but risks remain if developers skip "do not back up" flags or store tokens improperly.
What to do? Encrypt local secrets, mark critical files for backup exclusion, verify iOS and Android policies, use hardware storage (Secure Enclave, StrongBox), rotate refresh tokens on use, and invalidate upon any suspicion. And educate users: the cloud isn’t a keyless safe.
Testing and Audits: How to Safely Simulate Attacks and Plug Holes
A Lab for Pentesting Your Own Sessions
Create a test environment for experimentation: separate domain, test certificates, config copies. Set up proxy interception and simulate scenarios: public Wi-Fi (via isolated network), local MITM (ARP spoof), mixed content. Goal: see where cookies leak, unnecessary requests occur, or flags misbehave.
Test session behavior when switching networks, losing connection, or opening in other browsers. Does login regenerate session IDs? Is cookie Path restricted? Does SameSite work as expected? This crash test doesn’t need special tools but catches many nasty surprises before attackers do.
Tools: Interceptors, Scanners, and Analyzers
Burp Suite or OWASP ZAP paired with browser proxy highlight dozens of issues: missing HSTS, bad CORS, cookie leaks. Add sniffers (Wireshark) in testing networks, run "dirty" scenarios with TLS stripping attempts. Automated mixed content scanners and static web server config analyzers are great bonuses.
On mobile, use emulators and proxies with certificate insertion to observe app network stacks. Apps should strictly "distrust" rogue certificates (certificate pinning), especially for auth. But balance is key: too strict pinning without rotation leads to widespread breakage.
Session Security Checklist
Quick list: Secure, HttpOnly, SameSite; HSTS with preload; no mixed content; session ID regeneration after login; short access token TTL and refresh rotation; contextual session validation and anomaly alerts; strict CSP and domain isolation; no secrets in localStorage; secure mobile backups; mass token invalidation and logging.
If you haven’t implemented at least half, forget about easy sleep. Really, you need about 80% of this list to feel confident against common wild attacks.
2026 Trends: A World Beyond Passwords, But Still Sessions
Passkeys and What They Don’t Solve
Passkeys push us toward a phishing-free passwordless future. Great! But post-login, you still have sessions. They must be stored, refreshed, and verified. Account hijacking shifts from "stolen password" to "stolen token." The bright side? Initial login attempts drop sharply, making session monitoring the main defense front. Device binding for sensitive actions is now the de facto standard.
Alongside this, hardware keys and request signing grow in popularity: proving possession of a private key at the moment of action. Sessions might be stolen, but operation signing can’t be faked. This reduces the value of a "bare" cookie, turning it into half a puzzle piece.
QUIC, ECH, Content Isolation, and Browser Policies
HTTP/3 and QUIC are everywhere. ECH encrypts client hello, lessening domain observation. Browsers tighten rules: strict SameSite by default, banning third-party cookies, partitioned storage. These chop many historic sidejacking vectors. But front-ends remain complex, libraries grow, dependency chains lengthen. A misconfiguration can still open gates.
Demand for browser isolation (remote browser isolation) in enterprises adds a layer: risky content runs in a sandbox away from the user device. Sessions live somewhere in between. This new architecture calls for careful context and binding management.
Real-Time ML Anomaly Detection
Risk engines got smarter. Telemetry-trained models spot stolen sessions by unusual navigation speed, strange paths, and patterns invisible to humans. The key: don’t annoy users with false positives. Best practice: an engine “advises” the auth system when to trigger extra checks, plus a platform that instantly invalidates tokens.
Zero Trust isn’t a slogan anymore—it’s everyday routine: “trust no one by default, verify every session, assign trust levels per request.” It sounds dull, but it works.
Checklists and Step-by-Step Guides: Quick Wins for Peace of Mind
User: 10 Quick Steps
- Always turn on VPN on public networks. - Disable Wi-Fi auto-connect. - Use mobile hotspot instead of random Wi-Fi. - Maintain separate browser profiles for work and personal. - Minimize extensions. - Enable 2FA via app, not SMS. - Turn on notifications for new logins. - Regularly clear "all active sessions." - Update devices and browsers. - Never enter data on pages with red locks or no HTTPS, not even briefly.
Simple rules, but they close main attack vectors. And yes, confirm your VPN’s kill switch is active, especially on laptops you often put to sleep.
Administrator/Developer: 12 Default Settings
- Secure, HttpOnly, SameSite on all session cookies. - HSTS with preload on root and critical subdomains. - Block mixed content and automate scans. - Rotate refresh tokens on every use. - Access token TTL 5–15 minutes. - Regenerate session IDs after login. - Adaptive authentication on anomalies. - Session logging and risk alerts. - CSP and separating auth domains from static. - No storing secrets in localStorage. - Built-in "red button" for mass token invalidation. - Regular pentests and checklist reviews pre-release.
Make this the standard—not an option—to avoid human errors turning into disasters.
BYOD and Mobile Teams: Special Considerations
For phones and tablets, enable Always-On VPN, disable split tunneling for work profiles, use MDM/EMM for app policy control. Separate work and personal data at the profile level. Block installation of uncertified app stores. Enforce device integrity checks and block corporate app use on rooted or jailbroken devices.
Require extra device verification (mTLS or hardware key) for admin area access. Mobility brings convenience and new risks. Your mission: stolen mobile tokens shouldn’t open doors directly but break at additional checks.
Plan B: What to Do After an Incident
Detected a session hijack? Immediately revoke all active sessions for that user. Rotate JWT signing keys and integration secrets. Enable heightened checks on risky actions for 24–72 hours. Conduct a brief but precise post-mortem: where the token leaked, why protections failed, what signals were missed. Update rules, add tests, and share a brief guide with the team.
Most importantly—don’t hesitate to admit the mistake to users. Honest communication reduces damage and rebuilds trust. Yes, it stings. But that’s mature security.
Where VPN Can't Help and How to Cover These Gaps
Client-Side Vulnerabilities: XSS, Extensions, and Malware
If malicious scripts run in your page context, VPN is powerless: session tokens and requests come from your browser. If an extension grabs and sends cookies outside, the tunnel doesn’t matter. That’s why a clean browser and strict CSP are as crucial as a solid VPN client. They’re two halves of one shield.
Use browsers with site isolation, disable autorun plugins, enable strong privacy settings. Review extensions carefully: fewer installs, deeper checks. It’s boring but effective.
Poor Server Configurations and Unsafe Integrations
Cookies lacking Secure or HttpOnly, missing HSTS, open redirects—VPN won’t fix bad server setups. Strict server configs are essential. For integrations: share minimum info, sign requests, use separate keys per partner, and limit by IP and roles. If a partner’s key leaks, you don’t want the whole system compromised.
Build “defense trenches”: stolen tokens must be useless outside their context and expire quickly on anomalies.
Social Engineering and Habit Attacks
We click fast, trust easily, and rush. Attackers thrive on that. Phishing domains, short links, urgent "confirm access" demands. This area relies solely on hygiene: verify domains carefully, apply focused attention in crucial moments, and train your team. In 2026, visual fakes are more convincing than ever. Give yourself one extra click of verification—and take away attackers’ most valuable asset: your inattention.
Also, use password managers and passkeys. Even if they don’t directly stop session hijacking, they close side doors.
Summary: A Simple Strategy Against Complex Attacks
The Three Pillars: VPN, Strict Sessions, and Discipline
Success isn’t one big trick but a set of small ones. VPN on untrusted networks, correct cookie flags and token rotation, vigilance in browsers, and minimal extensions. It sounds boring but saves hours of life and nerves. Sidejacking loses its edge, hijacking becomes tougher, and account takeovers turn from daily threats into rare incidents.
Build defense in layers. Mistakes will happen, and that’s okay. What matters is that one mistake doesn’t lead to disaster. That’s why you need encryption, policies, monitoring, and training.
Today and Tomorrow: Where to Look Next
Watch for Passkeys, contextual tokens, DPoP, mTLS for admin areas, automated token revocation, and ML-driven detection. Follow browser innovations: stricter cookies, privacy, isolation. And never forget basic habits. They hold 80% of your security.
For now, check if your kill switch is on, Always-On VPN is enabled on your phone, and your browser has no extra extensions. Your session will thank you.
FAQ: Quick Answers to the Most Common Questions
Will VPN Protect Against All Session Hijacking Attacks?
No. VPN reliably encrypts traffic between your device and its server, blocking interception on local networks and untrusted Wi-Fi. It breaks most sidejacking scenarios and makes MITM much harder. But if tokens are stolen inside the browser via XSS, malicious extensions, or phishing, VPN won’t help. That’s why additional measures like cookie flags, CSP, token rotation, 2FA, and monitoring are vital.
Do I Need VPN If the Site Uses HTTPS and HSTS?
Yes, ideally. HTTPS and HSTS protect the browser-to-site channel but don’t address issues on open networks where metadata leaks and MITM attempts remain possible. VPN adds encryption over your local network and hides traffic even from the access point owner. This is crucial on public Wi-Fi or when using someone else’s routers.
Will 2FA Help if My Session Cookie Is Stolen?
If the session is active and tokens are valid, attackers don’t need 2FA to enter—they’re already in. But 2FA helps prevent re-entry after token revocation and stops break-ins from scratch. Ideally, combine 2FA with monitoring and contextual checks so session hijacks are quickly spotted and challenged.
Where Should Tokens Be Stored: Cookies or localStorage?
Prefer HttpOnly cookies with Secure and strict SameSite flags. localStorage is accessible to JavaScript and vulnerable to XSS. If bearer tokens are unavoidable, keep TTLs short, add contextual checks, sign sensitive requests, and avoid long-lived tokens on the client.
Does Running My Own VPN on a VPS Protect as Well as Commercial Services?
Owning your VPN offers control and predictable IPs — convenient. Protection-wise, it encrypts public network traffic just as well. But you’re responsible for updates, configuration, monitoring, and uptime. Commercial providers add polished clients, kill switches, obfuscation, and distributed infrastructure. Choose what fits your resources and risks.
How Can I Tell If My Session Has Been Hijacked?
Signs include logins from new devices, alerts about unusual locations, unfamiliar actions in logs, and unexpected emails about setting changes. If something feels off, log out all sessions, change your password, and enable 2FA. Review connected apps and revoke unneeded integration tokens. And yes, turn on VPN when next logging in from a public network.
Should I Use Split Tunneling?
For session protection, it’s better not to. Split tunneling is handy for local resource access and speed but can route sensitive traffic outside the VPN. If your goal is to prevent cookie interception on the "last mile," send all traffic through VPN—especially login pages and APIs. In corporate settings, enforce policies excluding critical domains from split tunneling by default.