Encrypted Affairs: Proxmox, WireGuard, Kali & a Mac
A story of broken configs, three stubborn networks, and one stubborn woman chaos, confusion, and eventually… connection.
@bryan
After some real basic remote access use cases I tried tailscale for a while and after checking out netbird coz it felt more batteries included and more customisations through UI and of course it's fully self hostable and open source.
But I still follow the release notes of tailscale on their new releases.
#netbird #tailscale #WireGuard #vpn #SelfHosting #networking
Encrypted Affairs: Proxmox, WireGuard, Kali & a Mac
A story of broken configs, three stubborn networks, and one stubborn woman chaos, confusion, and eventually… connection.
Что будет с привычным VPN с 1 мая 2026 года
За последние дни произошло сразу несколько событий вокруг VPN, которые в совокупности кардинально меняют правила игры для миллионов пользователей. В этой статье мы рассмотрим, какие именно изменения могут быть приняты в отношении VPN, как операторы выявляют использование VPN, чем будущие возможные ограничения грозят пользователям и что делать, чтобы сохранить доступ к привычным сервисам.
https://habr.com/ru/articles/1017492/
#vpn #dpi #международный_трафик #TLS_fingerprint #wireguard #openvpn #15ГБ #белые_списки #ограничение_трафика
Как оператор связи видит, что вы используете VPN — техническая сторона вопроса
VPN шифрует ваш трафик, но не скрывает сам факт использования VPN. Провайдер знает — и вот как именно. Разбираю четыре уровня обнаружения: от проверки IP по базам до DPI-анализа TLS fingerprint’ов и российских ТСПУ с пропускной способностью 132 Тбит/с, которые в марте 2026-го ушли в bypass из-за перегрузки.
https://habr.com/ru/articles/1017158/?utm_source=habrahabr&utm_medium=rss&utm_campaign=1017158
#vpn #dpi #тспу #сетевая_безопасность #wireguard #openvpn #роскомнадзор
I had read good reviews about the #GL-iNet #routers so I purchased one of their products around 18 months ago. One of my main motivations was supporting, at some level, #OpenWrt and including tools like #AdGuardHome and #Wireguard.
But to be honest, it all has been a bit disappointing.
AdGuardHome never worked very well. Apart from being slow, the service would frequently freeze (e.g. whenever I updated the custom filter) and I had to manually restart it.
In addition, the system stack was quite messy and difficult to make sense of. For example, the #DNS service #Dnsmasq could be managed directly or via Openwrt, sometimes creating unintended problems.
Anyway, the router decided to implode after a firmware upgrade, which is quite underwhelming. I tried a few things like reflashing Uboot, factory reset, etc. before deciding to just toss it away and get another one, from a different brand.
Tailscale is great, but sometimes a real mesh is better. 🕸️
Stop letting Cloudflare own your ingress. I’m breaking down why a self-hosted WireGuard mesh (via NetBird) beats a standard reverse proxy for internal service stability and zero-trust security.
Read the full architectural breakdown:
https://kindalame.com/2026/03/30/self-hosted-wireguard-mesh-vs-cloudflare-tunnel-when-netbirds-reverse-proxy-actually-pays-off/
#SelfHosted #WireGuard #NetBird #Cloudflare #HomeLab #DevOps #SysAdmin #Privacy #Networking #KindaLame
I'm trying to figure out how I can support the scripting options of wg-quick within my tool. Obviously we can't do it within .network and .netdev files, but I also don't see a way to trigger a unit based on a specific interface becoming routable and configured. Perhaps there is a way using systemd.path magic?
Thanks to #WireGuard, my emulated Windows 98 machine just mounted its Samba share on my home server, which happens to be 1,500 km away right now.