After spending hours working on #wireguard to have a proper access control, I'm starting to realize that I'm better off using #tailscale for that.
[this little wiki page](https://github.com/wg-easy/wg-easy/wiki/Restrict-Access-to-Networks-with-iptables) really helped me figure out what to do to access control #wireguard
If you have used and loved #Tailscale, and you still like the product but want a sensible insurance option to reduce your exposure to potential #enshittification, what *hosted* options have you looked at as alternatives?
Part of the appeal of #Tailscale for me at least was that they provided a really thoughtful UX layer over some existing cool OSS tech like #wireguard.
Also, many of us have tried self-hosting and want to minimise what they self host if at all possible.
https://mastodon.social/@JonathanGerlach/114302498688902923
@JessTheUnstill @Pibble
And yes, I treat all devices as insecure and would rather invest the time and effort needed get #TechIlliterates up to speed on the #OfflinePGP method!
Given the cheapness of storage (legitimate 1TB microSD cards exist and they ain't 4-digit items!) I'd legitimately look into #OTP #encryption and (IF I had the €€€€€€ to do so!) would even sponsor implementing it in #OpenVPN, #WireGuard and #OpenSSH (for #SSH-Tunmeling).
I sincerely wish y'all could legitimately call me a tinfoilhat but so far I've been proven right all the time...
Na das lief ja schonmal gut!
Dank #wireguard und #remmina steht die sichere Verbindung ins Büro per #rdp. Das #homeoffice ist also auch unter #linuxmint startklar. Der lokale Drucker daheim kann ebenso angesprochen werden.