eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

201
active users

#wireguard

5 posts5 participants0 posts today
Some Bits: Nelson's Linkblog<p>AmneziaWG: A version of Wireguard designed to be harder to detect by deep packet inspection<br><a href="https://docs.amnezia.org/documentation/amnezia-wg/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.amnezia.org/documentation</span><span class="invisible">/amnezia-wg/</span></a><br> <a href="https://tech.lgbt/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://tech.lgbt/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://tech.lgbt/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://tech.lgbt/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://tech.lgbt/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> #+</p>
Mika<p>I've managed to rent one from <a href="https://sakurajima.social/tags/SmartHost" rel="nofollow noopener" target="_blank">#SmartHost</a><span> for relatively cheap (2.95 USD a month) - there's also another option (forgot its name) for cheaper at roughly ~2.17 USD a month I think but only if you pay for it annually.<br><br>Anyway, I managed to set up a </span><a href="https://sakurajima.social/tags/WireGuard" rel="nofollow noopener" target="_blank">#WireGuard</a> <a href="https://sakurajima.social/tags/VPN" rel="nofollow noopener" target="_blank">#VPN</a> on it so now I've a personal VPN server in Tokyo... but I don't really have a use for it for now haha. This is more of an <i>experiment</i> I wanted to do, using a commercial <a href="https://sakurajima.social/tags/VPS" rel="nofollow noopener" target="_blank">#VPS</a> instead of self-hosting on my <a href="https://sakurajima.social/tags/homelab" rel="nofollow noopener" target="_blank">#homelab</a><span>.<br><br>Pretty neat, will prolly document it in my Wiki. Anyway, fuck </span><a href="https://sakurajima.social/tags/Linode" rel="nofollow noopener" target="_blank">#Linode</a>.</p>
Robert W. Gehl<p>welp, my latest Fedora KDE update borked my Wireguard installation. No discernable errors. It just... won't connect to its peer. </p><p>Maybe it's time to do something other than Fedora...</p><p><a href="https://aoir.social/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> <a href="https://aoir.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://aoir.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Michael Jack<p>I've got an OpenBSD VPS with a WireGuard connection to a server on my home network. I can ssh and ping both ways through the WireGuard tunnel.</p><p>Would it be possible to use relayd on the VPS to direct traffic to different services running on the server at home?</p><p>service1.example.com -&gt; server:8443<br>service2.example.com -&gt; server:8090</p><p>It kind of looks that way from:</p><p><a href="https://mutualaid.info/posts/using-relayd-as-a-reverse-proxy-on-openbsd/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mutualaid.info/posts/using-rel</span><span class="invisible">ayd-as-a-reverse-proxy-on-openbsd/</span></a></p><p>I can add DNS records to the domain in question.</p><p>(I'm new to OpenBSD, but not Linux)</p><p><a href="https://hachyderm.io/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
ilmari<p>Dear <a href="https://social.treehouse.systems/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://social.treehouse.systems/tags/askfedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>askfedi</span></a> </p><p>I'm trying to set up a <a href="https://social.treehouse.systems/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> lighthouse setup following <span class="h-card" translate="no"><a href="https://infosec.exchange/@mttaggart" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mttaggart</span></a></span>'s <a href="https://taggart-tech.com/wireguard/" rel="nofollow noopener" target="_blank">guide</a>, but I'm not having any luck.</p><p>I've got a Hetzner VM running <a href="https://social.treehouse.systems/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> Bookworm as the lighthouse, and I've tried connecting from both a <a href="https://social.treehouse.systems/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> Trixie VM on my work MacBook, and <a href="https://social.treehouse.systems/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> Noble on a separate laptop. </p><p>Using <a href="https://social.treehouse.systems/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> on the lighthouse I can see the packets arriving on the right port, but there's no response, and nothing is being logged even though I've enabled debug logging from the kernel module using</p><pre><code>echo module wireguard +p &gt; /sys/kernel/debug/dynamic_debug/control<br></code></pre><p>as documented in the <code>wg</code> manpage.</p><p>On the client I see the following in <code>dmesg</code>:</p><pre><code>wireguard: lighthouse: Sending handshake initiation to peer 3 (&lt;server ip&gt;:&lt;server port&gt;)<br>lighthouse: Handshake for peer 3 (&lt;server ip&gt;:&lt;server port&gt;) did not complete after 5 seconds, retrying (try 2)<br></code></pre><p>Does anyone know from personal experience how to get this working?</p>
The IT Blog<p><strong>Welcome Wireguard (It’s really always DNS)</strong></p><p>Today I commuted to work and of course wanted to try my new <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/navidrome/" target="_blank">#Navidrome</a> setup that I wrote about before. And – it didn’t work 🙁 It couldn’t resolve the host name. DNS – again! </p><p> […]</p><p><a href="https://www.locked.de/welcome-wireguard-its-really-always-dns/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">locked.de/welcome-wireguard-it</span><span class="invisible">s-really-always-dns/</span></a></p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/dns/" target="_blank">#DNS</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/fritzbox/" target="_blank">#FRITZBox</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/navidrome/" target="_blank">#Navidrome</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/vpn/" target="_blank">#VPN</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://www.locked.de/tag/wireguard/" target="_blank">#wireguard</a></p>
patpro<p>Installation du client <a href="https://social.patpro.net/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> sur Amazon Fire TV :</p><p><a href="https://www.patpro.net/blog/index.php/2025/07/30/3792-installer-wireguard-sur-un-amazon-fire-tv/" rel="nofollow noopener" target="_blank">https://www.patpro.net/blog/index.php/2025/07/30/3792-installer-wireguard-sur-un-amazon-fire-tv/</a></p>
Alec Muffett<p>1995: Story Claims PGP Used to Cloak Net Pedophiles | CNET | banning VPNs would be like pissing against the wind…<br><a href="https://alecmuffett.com/article/113880" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">alecmuffett.com/article/113880</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://mastodon.social/tags/OnlineSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSafety</span></a> <a href="https://mastodon.social/tags/OnlineSafetyAct" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSafetyAct</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/aws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aws</span></a> <a href="https://mastodon.social/tags/censorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>censorship</span></a> <a href="https://mastodon.social/tags/ofcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ofcom</span></a> <a href="https://mastodon.social/tags/pgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pgp</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
Christoffer S.<p>If you've ever been curious about setting up a "good" WireGuard based private network I cannot recommend this article enough:</p><p><a href="https://taggart-tech.com/wireguard/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">taggart-tech.com/wireguard/</span><span class="invisible"></span></a></p><p>Written by <span class="h-card" translate="no"><a href="https://infosec.exchange/@mttaggart" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mttaggart</span></a></span> </p><p>It really does provide all the details, and more, about how to "properly" configure and setup a WG network of hosts and making things work.</p><p><a href="https://swecyb.com/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://swecyb.com/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://swecyb.com/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a></p>
Matthias Drexel<p>Hm, nach dem gestrigen Update geht die <a href="https://tyrol.social/tags/Companion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Companion</span></a> App mal via <a href="https://tyrol.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> VPN nicht mehr</p><p>Mäh...</p><p><a href="https://tyrol.social/tags/Homeassistant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homeassistant</span></a></p>
cynicalsecurity :cm_2:<p>This is a very specific <a href="https://bsd.network/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> and <a href="https://bsd.network/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> question.</p><p>Is there a way to start a Wireguard tunnel (which I now do manually for reasons which will become obvious) when you change your Location to specific ones?</p><p>For example:</p><p>* Location "Office" -&gt; no Wireguard<br>* Location "Home" -&gt; Wireguard to specific endpoint<br>* Location "Automatic" -&gt; Wireguard to another endpoint</p><p>I know the launchd trick¹ to have it run at startup but this would be "all the time" as opposed to location-dependent:</p><p>I'm sure there is a magic macOS incantation for it :flan_XD:</p><p>:flan_piteous:​</p><p>__<br>¹ for those who don't know how to start Wireguard at boot on macOS:</p><p>cat &gt; com.wireguard.endpoint.plist &lt;&lt;EOF<br>&lt;?xml version="1.0" encoding="UTF-8"?&gt;<br>&lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "<a href="http://www.apple.com/DTDs/PropertyList-1.0.dtd" rel="nofollow noopener" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">apple.com/DTDs/PropertyList-1.</span><span class="invisible">0.dtd</span></a>"&gt;<br>&lt;plist version="1.0"&gt;<br> &lt;dict&gt;<br> &lt;key&gt;Label&lt;/key&gt;<br> &lt;string&gt;com.wireguard.endpoint&lt;/string&gt;<br> &lt;key&gt;ProgramArguments&lt;/key&gt;<br> &lt;array&gt;<br> &lt;!-- Points to local version of wg-quick that<br> fixes path issues with the script --&gt;<br> &lt;string&gt;/opt/local/bin/wg-quick&lt;/string&gt;<br> &lt;string&gt;up&lt;/string&gt;<br> &lt;string&gt;endpoint&lt;/string&gt;<br> &lt;/array&gt;<br> &lt;key&gt;KeepAlive&lt;/key&gt;<br> &lt;dict&gt;<br> &lt;key&gt;NetworkState&lt;/key&gt;<br> &lt;true/&gt;<br> &lt;/dict&gt;<br> &lt;key&gt;RunAtLoad&lt;/key&gt;<br> &lt;true/&gt;<br> &lt;key&gt;StandardErrorPath&lt;/key&gt;<br> &lt;string&gt;/opt/local/var/log/wireguard.err&lt;/string&gt;<br> &lt;key&gt;EnvironmentVariables&lt;/key&gt;<br> &lt;dict&gt;<br> &lt;key&gt;PATH&lt;/key&gt;<br> &lt;!-- Adds in user-specific and MacPorts bin directories to start of PATH --&gt;<br> &lt;string&gt;/opt/local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin&lt;/string&gt;<br> &lt;/dict&gt;<br> &lt;/dict&gt;<br>&lt;/plist&gt;<br>EOF</p><p>Followed by:</p><p>sudo cp com.wireguard.endpoint.plist /Library/LaunchDaemons<br>sudo launchctl enable system/com.wireguard.endpoint<br>sudo launchctl bootstrap system /Library/LaunchDaemons/com.wireguard.endpoint.plist</p>
Digitale Selbstverteidigung<p><span class="h-card" translate="no"><a href="https://mastodon.social/@HNumberger" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HNumberger</span></a></span> </p><p>🔴 Guten Morgen Helga,</p><p>da die Frage noch offen war, <a href="https://social.tchncs.de/tags/bookstack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bookstack</span></a> ist die Wiki-Plattform die ich nutze.</p><p><a href="https://www.bookstackapp.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bookstackapp.com/</span><span class="invisible"></span></a></p><p>Ich betreibe den Dienst auf einen VC 4-8 VServer von Strato (6€/Monat)</p><p><a href="https://www.strato.de/server/linux-vserver/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">strato.de/server/linux-vserver/</span><span class="invisible"></span></a></p><p>Installiert habe ich darauf <a href="https://social.tchncs.de/tags/yunohost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yunohost</span></a> als Basis.</p><p>Weitere Dienste sind darauf installiert:<br>➡️ Languagetool-Server</p><p><a href="https://apps.yunohost.org/app/languagetool" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apps.yunohost.org/app/language</span><span class="invisible">tool</span></a></p><p>➡️ Joplin-Server<br><a href="https://apps.yunohost.org/app/joplin" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">apps.yunohost.org/app/joplin</span><span class="invisible"></span></a></p><p>Geplant sind noch:</p><p>👉 Openprojekt-Server</p><p><a href="https://apps.yunohost.org/app/openproject" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apps.yunohost.org/app/openproj</span><span class="invisible">ect</span></a></p><p>👉 Collabora Online-Server als Integration für Nextcloud von Hetzner</p><p><a href="https://apps.yunohost.org/app/collabora" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">apps.yunohost.org/app/collabora</span><span class="invisible"></span></a></p><p>Das sollte dann reichen. </p><p>🔴 Alle anderen Dienste laufen über <a href="https://social.tchncs.de/tags/umbrel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>umbrel</span></a> auf meinen Home-Server. Erreichbar über <a href="https://social.tchncs.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> von außen.</p><p><a href="https://umbrel.com/umbrelos" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">umbrel.com/umbrelos</span><span class="invisible"></span></a></p><p>Viel Erfolg bei Deinem Projekt</p>
Kettwachsler<p>Immerhin sind wir inzwischen so weit, freies WLAN in Krankenhäusern zu haben.</p><p><a href="https://sueden.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://sueden.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
Digitale Selbstverteidigung<p><span class="h-card" translate="no"><a href="https://bildung.social/@_DigitalWriter_" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>_DigitalWriter_</span></a></span> <span class="h-card" translate="no"><a href="https://social.anoxinon.de/@pele" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pele</span></a></span> <span class="h-card" translate="no"><a href="https://social.anoxinon.de/@Lioh" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Lioh</span></a></span> <span class="h-card" translate="no"><a href="https://tech.lgbt/@lerothas" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lerothas</span></a></span> </p><p>🔴 Teste ja gerade <a href="https://social.tchncs.de/tags/umbrel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>umbrel</span></a> als Home-Server und muss gestehen, das es mir gut gefällt, habe <a href="https://social.tchncs.de/tags/heimdall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>heimdall</span></a> mal installiert und meine Dienste dort abgelegt die ich gerade installiert habe (+ Lesez.).<br><a href="https://heimdall.site/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heimdall.site/</span><span class="invisible"></span></a><br> Umbrel gibt jedem Dienst eine eigene Port-Nr. hinter der lokalen IP-Adresse. Somit sind alle Dienste nur im Heim-Netzwerk erreichbar. Habe in meiner Fritz!Box <a href="https://social.tchncs.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> als VPN-Tunnel eingerichtet und dann konnte ich die Dienste auch außerhalb meines Netzwerkes nutzen.</p>
Paul Fenwick<p>My country is going through one of its very many fuck-with-the-internet phases.</p><p>I used to use <a href="https://cloudisland.nz/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> for a self-hosted VPN, and it worked pretty well. Is there anything in that landscape that has changed in the last five or so years? ❤️</p>
Nikhil 🐧<p>so <a href="https://social.linux.pizza/tags/duckdns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>duckdns</span></a> is now a goner?</p><p>emergency hackathon tomorrow I guess, to replace this shit with a vps + <a href="https://social.linux.pizza/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> 😆</p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/IPFire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPFire</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Firewall Now Ships with Support for the <a href="https://fosstodon.org/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://fosstodon.org/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> Protocol </p><p><a href="https://9to5linux.com/ipfire-linux-firewall-now-ships-with-support-for-the-wireguard-vpn-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5linux.com/ipfire-linux-fir</span><span class="invisible">ewall-now-ships-with-support-for-the-wireguard-vpn-protocol</span></a></p>
Nikhil 🐧<p>next hackathon project will be replacing <a href="https://social.linux.pizza/tags/duckdns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>duckdns</span></a> with a vps that uses <a href="https://social.linux.pizza/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> to forward a connection.</p><p>duckdns has become so fucking unreliable lately -.-</p>
Blater<p><span class="h-card" translate="no"><a href="https://mastodon.social/@janvlug" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>janvlug</span></a></span> Hier gelukkig geen last van <a href="https://mastodon.blater.nl/tags/appdwang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appdwang</span></a>. De enige native apps naast de default apps van <a href="https://mastodon.blater.nl/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> zijn <a href="https://mastodon.blater.nl/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a>, <a href="https://mastodon.blater.nl/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> en <a href="https://mastodon.blater.nl/tags/OsmAnd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OsmAnd</span></a>. Kunnen ook vrij gemakkelijk buiten een reguliere appstore om worden binnengehaald. Banken en zelfs de communicatieapp met school (<a href="https://mastodon.blater.nl/tags/Parro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Parro</span></a>) zijn via de browser te gebruiken. Helaas werkt de laatste niet wanneer je bij de eerste benadering gstatic.com hebt geblokkeerd.</p>
0x0<p>Here's the customary <a href="https://hachyderm.io/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a>: i'm into <a href="https://hachyderm.io/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> and tolerate C++ on a daily basis at work, i've also used others like java, kotlin, python, PHP, etc and am curious about <a href="https://hachyderm.io/tags/COBOL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>COBOL</span></a>, <a href="https://hachyderm.io/tags/AdaLanguage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdaLanguage</span></a> and <a href="https://hachyderm.io/tags/erlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>erlang</span></a>.</p><p>My dislike of jenkins is only surpassed by my hate of githubactions and everything MS-related. AI is not I, only A. I'm interested in <a href="https://hachyderm.io/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> stuff but atm that's a VPS with some sites, which doesn't really count. For now <a href="https://hachyderm.io/tags/syncthing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syncthing</span></a> is quite useful and <a href="https://hachyderm.io/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> is on the horizon once i reformat/reinstall my current <a href="https://hachyderm.io/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a> (i'll keep the root <a href="https://hachyderm.io/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> aproach and am on the fence regarding <a href="https://hachyderm.io/tags/XFCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFCE</span></a> or <a href="https://hachyderm.io/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a>), would be interesting to have a barebones <a href="https://hachyderm.io/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a>/#QEMU running all the stuff and i digress.</p><p>kthxbai\0</p>