mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,7K
utenti attivi

#wireguard

5 post5 partecipanti1 post oggi
Carlos Mendible :verified:<p>Public Preview: Cilium WireGuard Encryption Support in AKS <a href="https://hachyderm.io/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://hachyderm.io/tags/cilium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cilium</span></a> <a href="https://hachyderm.io/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://hachyderm.io/tags/aks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aks</span></a> <a href="https://hachyderm.io/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> 👇 <a href="https://azure.microsoft.com/en-us/updates" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">azure.microsoft.com/en-us/upda</span><span class="invisible">tes</span></a></p>
Chris Geoghooligan<p>I’m running a manual <a href="https://toot.community/tags/ProtonVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProtonVPN</span></a> <a href="https://toot.community/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> configuration on my router and <a href="https://toot.community/tags/SlingTV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SlingTV</span></a> via my <a href="https://toot.community/tags/Roku" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roku</span></a> does not like it. Anyone else figure out how to get <a href="https://toot.community/tags/Sling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sling</span></a> to work through a <a href="https://toot.community/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>?</p>
Afra1d 0f F1r3w0rk5<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@kuketzforum" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kuketzforum</span></a></span> interessanter Beitrag. Ich nutze <a href="https://kanoa.de/tags/myfritz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>myfritz</span></a> + <a href="https://kanoa.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> intensiv. Da ich Pi-Hole und andere Dienste wie <a href="https://kanoa.de/tags/Jellyfin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jellyfin</span></a> usw. als LXC über <a href="https://kanoa.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> laufen lasse, werde ich mich mal damit beschäftigen, auch WG hierüber zu steuern und den Dienst in der <a href="https://kanoa.de/tags/Fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fritzbox</span></a> abzuschalten. Das ganze läuft allerdings seit sehr langer Zeit schon sehr stabil. Bin auf die Diskussion im Forum gespannt.</p>
Georg Ruß<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@zak" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zak</span></a></span> I'm running <a href="https://swiss.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> with exit nodes on my home network, so when I enable it on my phone, I get both ad-blocking DNS (pihole at home) and access to home resources at the same time. Based on <a href="https://swiss.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>.</p>
jolla<p>Cross open source collaboration: ConnMan connecting LibreElec and SailfishOS maintainers to get wider testing for the WireGuard changes. More info on <a href="https://forum.libreelec.tv/thread/29601-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.libreelec.tv/thread/2960</span><span class="invisible">1-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/</span></a></p><p><a href="https://techhub.social/tags/LibreELEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreELEC</span></a> <a href="https://techhub.social/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://techhub.social/tags/ConnMan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnMan</span></a> <a href="https://techhub.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a></p>
Ken Walker :caflag:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Edent" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Edent</span></a></span> I use <a href="https://cosocial.ca/tags/freedombox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freedombox</span></a> which includes <a href="https://cosocial.ca/tags/nextcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nextcloud</span></a>. I wonder if this means I can't run <a href="https://cosocial.ca/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>?</p>
Astian, Inc<p>First look Midori Browser with browsing VPN.</p><p>Midori Browser with VPN.... coming soon.</p><p>Behind all this there is <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>opensuse</span></a></span> being the best distro :-)</p><p><a href="https://mastodon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/midoribrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midoribrowser</span></a> <a href="https://mastodon.social/tags/midori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midori</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a></p>
awlnx<p>Here is a homebrew tap to install the proxyguard-client for <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://social.ffmuc.net/tags/MacOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOS</span></a>.</p><p>It also provides a little wrapper to setup the correct routes etc</p><p><a href="https://github.com/freifunkMUC/homebrew-proxyguard-client" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/homebre</span><span class="invisible">w-proxyguard-client</span></a></p><p>This way you can easily use Wireguard over HTTP/HTTPs.</p>
Rince<p>Kennt jemand eine Open Source-Variante von <a href="https://chaos.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a>? <a href="https://chaos.social/tags/WIreguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WIreguard</span></a> ist einfach, aber das zentral zu managen finde ich angenehm, mit einem <a href="https://chaos.social/tags/Zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zero</span></a>-Trust-Ansatz ist das hübsch....</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://zeroes.ca/@StaceyCornelius" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>StaceyCornelius</span></a></span> In the past I did configure seperate systems for clients so they can travel without fuss regardless if <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> or <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> or the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> or <a href="https://infosec.space/tags/KSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KSA</span></a>...</p><ul><li>The trick is to never have anything on your device and have a dedicaded burner!</li></ul><p>Using <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> and <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and when that's not an option, a <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel / <a href="https://infosec.space/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a> or <a href="https://infosec.space/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a>-<a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> to be able to <a href="https://infosec.space/tags/VNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VNC</span></a> into a machine.</p><ul><li>Remember: They can only extract data that was saved on a machine!</li></ul><p>CONSIDER THE <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> ENEMY TERRITORY AS IN <em>"If you wouldn't enter <a href="https://infosec.space/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a>, then why would you enter the USA?"</em></p><p><a href="https://infosec.space/tags/Cyberfacism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberfacism</span></a> <a href="https://infosec.space/tags/USpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USpol</span></a> <a href="https://infosec.space/tags/Facism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facism</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a></p>
Bhante Subharo :xmpp:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ceresbzns" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ceresbzns</span></a></span> You'd probably hate it, as it involves using short-lived nfs mounts through <a href="https://c.im/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> tunnels. The hosts in the LAN copy the certs they need in this way. Systemd timers automate this "pulling". I only had to write 10 lines of bash code, in the way of actual programming.</p>
aiyion<p>Der neue OpenWrt One spricht Freifunk.<br>Und da das LeineLab über einen hervorragenden Laser verfügt, haben wir die Skyline Hannovers verstetigt.</p><p>Richtig gutes Gerät übrigens. WireGuard Speedtest Nutztraffic 330Mbit/s down, 230Mbit/s up.</p><p><a href="https://infosec.exchange/tags/freifunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freifunk</span></a> <a href="https://infosec.exchange/tags/gluon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gluon</span></a> <a href="https://infosec.exchange/tags/openwrt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openwrt</span></a> <a href="https://infosec.exchange/tags/leinelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leinelab</span></a> <a href="https://infosec.exchange/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <span class="h-card" translate="no"><a href="https://friendica.me/profile/freifunkh" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freifunkh</span></a></span></p>
Michael Jack<p>I wanted to set up VPN with ad-blocking for laptop and mobile, for when away from home, so I installed FreeBSD 14.2 on a Raspberry Pi 4, because why not?</p><p>Followed:</p><p>1) <a href="https://www.zenarmor.com/docs/network-security-tutorials/how-to-install-wireguard-on-freebsd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zenarmor.com/docs/network-secu</span><span class="invisible">rity-tutorials/how-to-install-wireguard-on-freebsd</span></a> </p><p>2) <a href="https://it-notes.dragas.net/2023/09/23/make-your-own-vpn-freebsd-wireguard-ipv6-and-ad-blocking-included/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2023/09/23</span><span class="invisible">/make-your-own-vpn-freebsd-wireguard-ipv6-and-ad-blocking-included/</span></a></p><p>(only using IPv4)</p><p>Seems to work as intended, but I'm not sure if ~500 ms ping times are normal for 5G mobile connection through VPN.</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> <a href="https://fosstodon.org/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> <a href="https://fosstodon.org/tags/Unbound" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unbound</span></a></p>
Bhante Subharo :xmpp:<p>Yes, for some reason, <a href="https://c.im/tags/KDE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KDE</span></a> is way better than <a href="https://c.im/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> Mint's Cinnamon (or Mate) desktop (LM22), when one has multiple <a href="https://c.im/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> connections. :dy62: </p><p>I'm also really liking how the Bluetooth devices are connected to right from KDE's panel applet - several steps saved. Worked great.</p><p><a href="https://c.im/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> <a href="https://c.im/tags/trixie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trixie</span></a> <a href="https://c.im/tags/LinuxMint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxMint</span></a></p>
Alex<p>Wow, <a href="https://swiss.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> actually helped me debug a networking issue I had. My <a href="https://swiss.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> tunnel did not work as expected, most traffic was tunnelled just fine, but some websites I tried to access through it did not want to load and just timed out, even though curl showed me that DNS worked and that it could connect.<br>The culprit: MTU. Setting it slightly lower to 1410 seemed to fix it for me. Probably due to PPPoE..<br><a href="https://swiss.social/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://swiss.social/tags/itsnotalwaysDNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsnotalwaysDNS</span></a></p>
kr0n<p>Mi <a href="https://mas.to/tags/NAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAS</span></a> (DS218Play) es ya bastante antigüillo y no puede correr <a href="https://mas.to/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a>. Cuando pongo una descarga tocha se queda unos minutos que apenas responde y por ejemplo <a href="https://mas.to/tags/Synology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Synology</span></a> Photos tarda bastante en cargar las miniaturas.</p><p>Llevo tiempo detrás de un NAS nuevo pero al final me estoy viendo que estoy moviendo todas las cosas que más usaba de Synology a mi MiniPC. </p><p>Empecé quitando <a href="https://mas.to/tags/Plex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Plex</span></a> y moviendolo al MiniPC, luego la <a href="https://mas.to/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> (<a href="https://mas.to/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a>), después he empezado a usar <a href="https://mas.to/tags/Immich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Immich</span></a> y por último <a href="https://mas.to/tags/qBitorrent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qBitorrent</span></a>.</p>
Linux Renaissance<p><strong>Linux VPN With Wireguard And Mikrotik</strong></p> <p><a href="https://video.fosshq.org/videos/watch/6f3a544b-8104-45cf-ac12-c7c2416fbbef" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/videos/watch/</span><span class="invisible">6f3a544b-8104-45cf-ac12-c7c2416fbbef</span></a></p>
Bhante Subharo :xmpp:<p>I have an older Asus Zenbook laptop with <a href="https://c.im/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> Mint Mate 22. It had two annoying bugs - the backlit keys kept coming back on, and <a href="https://c.im/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> use was flaky from nm-applet (worked great in LM21). I put in an inexpensive M.2 SATA stick instead, and I'm giving <a href="https://c.im/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> testing a try with <a href="https://c.im/tags/KDE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KDE</span></a> Plasma. <a href="https://c.im/tags/Wayland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wayland</span></a> is good so far. I'll try wireguard soon, that's the important thing for me: it has to be smooth to turn on and off connections, and even accommodate multiple Wireguard connections in the case of not needing DNS or NAT.<br><a href="https://c.im/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://c.im/tags/LinuxMint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxMint</span></a></p>
LavX News<p>WireGuard for Apple: Enhancements and Updates in the Latest Pull Requests</p><p>The WireGuard project continues to evolve, with recent pull requests focusing on improving the user experience and compatibility across Apple platforms. This article delves into the latest contributio...</p><p><a href="https://news.lavx.hu/article/wireguard-for-apple-enhancements-and-updates-in-the-latest-pull-requests" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/wireguard</span><span class="invisible">-for-apple-enhancements-and-updates-in-the-latest-pull-requests</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/VPNSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPNSecurity</span></a> <a href="https://mastodon.cloud/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.cloud/tags/AppleDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleDevelopment</span></a></p>
Freifunk München<p>Reminder we are also maintaining an <a href="https://social.ffmuc.net/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> enabled version of wg-access-server.</p><p>A neat all-in-one solution for <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> VPNs</p><p><a href="https://github.com/freifunkMUC/wg-access-server" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/wg-acce</span><span class="invisible">ss-server</span></a></p>