Then the difference is really that someone else is handing the security, right? At the end of the day, there’s an encrypted file somewhere, and a TOTP only protects a particular connection by network.
Then the difference is really that someone else is handing the security, right? At the end of the day, there’s an encrypted file somewhere, and a TOTP only protects a particular connection by network.
KeepassXC handles TOTP.
Isn’t there a film about saving him?
While a CVSS score of 9.9 indicates critical severity, it’s important to approach the situation with a balanced perspective.
The whole article sounds like somebody asked chatGPT to explain the tweet in more detail.
Yes, but… IIRC dubious connections and motives. Cf the Audacity debacle
Ok
They pass TCP over UDP.
I took a quick look at the GitHub repo - selfhosted Netbird looks harder and more resource hungry, not easier! At least compared to Nebula.
Wow, self-hosting Netbird is a lot more involved than Nebula, and needing a lot more resources!
Isn’t that the same with all of them? Using UDP so they can tunnel between machines that are both behind NAT?
Thank you, that’s helpful. I’ll look up Authentik.
Does Tinc have advantages over Nebula? I was under the impression that both Nebula and Tailscale improved on Tinc, albeit in different ways.
I agree having a paid service, or some viable finance model, is a good sign for longevity …that said Nebula is what Slack use themselves so publicly or privately it’s going to be kept developed!
Just the fact the Android client is only properly configurable if you use their managed config service, made me worry a bit. Even though Tailscale you’re signing up for more eggs in their basket (unless you use Headscale), it felt like at least you start out on that basis, you aren’t pushed into it unexpectedly.
I do like that both projects talk politely about each other. That feels like a good sign for both!
I’ll check out Netbird, thank you.
Is Headscale easier than Nebula? I thought it looked like it might become much more work.
Nebula was mostly easy, but had a few hurdles I needed to learn.
I have mixed feelings about trying Defined Networking’s managed config, but I imagine that would get round the learning curve of the config.
What’s an edge vps? Is that some sort of distributed cdn-style vps? Or just a VPS at the ‘edge’ of your network?
Biggest points for me of having a mesh, not a central Wireguard hub, are,
Nebula you also need a VPS or something public for the coordination server (‘lighthouse node’). Seems there’s no way around that at the moment: at least one machine, of your own or another’s, has to have a public IP so the other machines can learn how to connect to each other.
I don’t know a lot about Tinc, but it looked to me like both Nebula (directly inspired by Tinc) and Tailscale solve problems Tinc has, and improve on its excellent but older design.
Let the Elites keep their privacy, and the Peasants their pitchforks.
– some revolutionary leader? I dunno
Oops, I did it again, I piercèd your heart