c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.9K
active users

#wireguard

12 posts12 participants0 posts today
Afra1d 0f F1r3w0rk5<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@kuketzforum" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kuketzforum</span></a></span> interessanter Beitrag. Ich nutze <a href="https://kanoa.de/tags/myfritz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>myfritz</span></a> + <a href="https://kanoa.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> intensiv. Da ich Pi-Hole und andere Dienste wie <a href="https://kanoa.de/tags/Jellyfin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jellyfin</span></a> usw. als LXC über <a href="https://kanoa.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> laufen lasse, werde ich mich mal damit beschäftigen, auch WG hierüber zu steuern und den Dienst in der <a href="https://kanoa.de/tags/Fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fritzbox</span></a> abzuschalten. Das ganze läuft allerdings seit sehr langer Zeit schon sehr stabil. Bin auf die Diskussion im Forum gespannt.</p>
Abimelech B. 🐧🇩🇪| wörk ™️<p><span class="h-card" translate="no"><a href="https://techhub.social/@bradley" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bradley</span></a></span> I'm NOT exposing my <a href="https://fulda.social/tags/pihole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pihole</span></a> (s) directly to the internet - I use one at home and another one via <a href="https://fulda.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://fulda.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> whereever I may roam 🙂 Exposed ports for GUI and "healtchecks" are on a "random" highport which keeps logs mostly clear of "noise". Sometimes some scanners like <a href="https://fulda.social/tags/censys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>censys</span></a> (or <a href="https://fulda.social/tags/shodan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodan</span></a> ) might also find these ports, but <a href="https://fulda.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> is very helpful 😉 <br>Feel free to ask my via PM if something is not clear. I like feedback to make my docs better.</p>
Georg Ruß<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@zak" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zak</span></a></span> I'm running <a href="https://swiss.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> with exit nodes on my home network, so when I enable it on my phone, I get both ad-blocking DNS (pihole at home) and access to home resources at the same time. Based on <a href="https://swiss.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>.</p>
jolla<p>Cross open source collaboration: ConnMan connecting LibreElec and SailfishOS maintainers to get wider testing for the WireGuard changes. More info on <a href="https://forum.libreelec.tv/thread/29601-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.libreelec.tv/thread/2960</span><span class="invisible">1-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/</span></a></p><p><a href="https://techhub.social/tags/LibreELEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreELEC</span></a> <a href="https://techhub.social/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://techhub.social/tags/ConnMan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnMan</span></a> <a href="https://techhub.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a></p>
Gauff 🇪🇺❤️🇺🇦<p><span class="h-card" translate="no"><a href="https://tech.lgbt/@pepperz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pepperz</span></a></span> It uses <a href="https://piaille.fr/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> , but allows you to have a set of your systems talking to each other over VPN without having to manually manage each connection (key pairs, ...) individually. Each system that joins becomes part of a mesh. Much, much easier!</p><p><a href="https://tailscale.com/kb/1151/what-is-tailscale" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tailscale.com/kb/1151/what-is-</span><span class="invisible">tailscale</span></a></p>
Ken Walker :caflag:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Edent" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Edent</span></a></span> I use <a href="https://cosocial.ca/tags/freedombox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freedombox</span></a> which includes <a href="https://cosocial.ca/tags/nextcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nextcloud</span></a>. I wonder if this means I can't run <a href="https://cosocial.ca/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>?</p>
𓊈Pepperz 🦴𓊉<p><span class="h-card" translate="no"><a href="https://piaille.fr/@gaufff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>gaufff</span></a></span> is Tailscale an alternative to <a href="https://tech.lgbt/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a></p>
Terence Eden<p>FFS! A server can't run both <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> *and* <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>.</p><p>Docker creates a "bridge" network interface which, apparently, interferes with WireGuard.</p><p>That was a depressing evening of eliminating the impossible. Completely stopping Docker allowed my VPN to connect.</p><p>And there's no way to actually run a Docker container without the network bridge (any documentation that says otherwise is lying).</p>
Astian, Inc<p>First look Midori Browser with browsing VPN.</p><p>Midori Browser with VPN.... coming soon.</p><p>Behind all this there is <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>opensuse</span></a></span> being the best distro :-)</p><p><a href="https://mastodon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/midoribrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midoribrowser</span></a> <a href="https://mastodon.social/tags/midori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midori</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a></p>
awlnx<p>Here is a homebrew tap to install the proxyguard-client for <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://social.ffmuc.net/tags/MacOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOS</span></a>.</p><p>It also provides a little wrapper to setup the correct routes etc</p><p><a href="https://github.com/freifunkMUC/homebrew-proxyguard-client" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/homebre</span><span class="invisible">w-proxyguard-client</span></a></p><p>This way you can easily use Wireguard over HTTP/HTTPs.</p>
Rince<p>Kennt jemand eine Open Source-Variante von <a href="https://chaos.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a>? <a href="https://chaos.social/tags/WIreguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WIreguard</span></a> ist einfach, aber das zentral zu managen finde ich angenehm, mit einem <a href="https://chaos.social/tags/Zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zero</span></a>-Trust-Ansatz ist das hübsch....</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://zeroes.ca/@StaceyCornelius" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>StaceyCornelius</span></a></span> In the past I did configure seperate systems for clients so they can travel without fuss regardless if <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> or <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> or the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> or <a href="https://infosec.space/tags/KSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KSA</span></a>...</p><ul><li>The trick is to never have anything on your device and have a dedicaded burner!</li></ul><p>Using <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> and <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and when that's not an option, a <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel / <a href="https://infosec.space/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a> or <a href="https://infosec.space/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a>-<a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> to be able to <a href="https://infosec.space/tags/VNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VNC</span></a> into a machine.</p><ul><li>Remember: They can only extract data that was saved on a machine!</li></ul><p>CONSIDER THE <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> ENEMY TERRITORY AS IN <em>"If you wouldn't enter <a href="https://infosec.space/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a>, then why would you enter the USA?"</em></p><p><a href="https://infosec.space/tags/Cyberfacism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberfacism</span></a> <a href="https://infosec.space/tags/USpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USpol</span></a> <a href="https://infosec.space/tags/Facism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facism</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a></p>
Habr<p>Почему лучше запустить «сырой», но рабочий сервис, чем доводить его до идеала</p><p>Всем привет! Давно не было новостей в нашем блоге. А всё потому, что мы много внимания уделяем нашему коммерческому проекту — Amnezia Premium . Для тех, кто использует AmneziaVPN как self-hosted решение, в скором времени тоже появятся важные и полезные обновления. А пока расскажем немного о том, как мы делали свой «большой VPN» — «не хуже, чем у других». Всё началось в 2020 году, когда мы создали клиент для настройки и установки VPN на собственный сервер. Это казалось отличной идеей, ведь так можно было выбрать любую юрисдикцию, получить собственный белый IP, поделиться доступом с неограниченным количеством друзей и обеспечить защиту от блокировки IP-адреса, ведь в случае с собственным IP никто, кроме владельца VPN, не сможет к нему подключиться. Мы по-прежнему считаем, что это одно из лучших решений, и мы очень благодарны читателям «Хабра», которые советовали и продолжают советовать AmneziaVPN как self-hosted клиент. Но сегодня рассказ будет о том, как мы пришли к премиум-версии.</p><p><a href="https://habr.com/ru/companies/amnezia/articles/892832/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/amnezia/</span><span class="invisible">articles/892832/</span></a></p><p><a href="https://zhub.link/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://zhub.link/tags/amneziavpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amneziavpn</span></a> <a href="https://zhub.link/tags/amnezia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amnezia</span></a> <a href="https://zhub.link/tags/amneziawg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amneziawg</span></a> <a href="https://zhub.link/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://zhub.link/tags/%D1%80%D0%B0%D0%B7%D1%80%D0%B0%D0%B1%D0%BE%D1%82%D0%BA%D0%B0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>разработка</span></a> <a href="https://zhub.link/tags/%D0%BC%D0%B0%D1%80%D0%BA%D0%B5%D1%82%D0%B8%D0%BD%D0%B3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>маркетинг</span></a> <a href="https://zhub.link/tags/mvp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mvp</span></a></p>
Javierinsitu<p>Conectarse a una <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> desde <a href="https://mastodon.social/tags/plasma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plasma</span></a> (fácil!)</p><p><a href="https://milangaelectronica.com.ar/posts/165-wireguard-desde-plasma/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">milangaelectronica.com.ar/post</span><span class="invisible">s/165-wireguard-desde-plasma/</span></a></p>
Bhante Subharo :xmpp:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ceresbzns" class="u-url mention">@<span>ceresbzns</span></a></span> You&#39;d probably hate it, as it involves using short-lived nfs mounts through <a href="https://c.im/tags/wireguard" class="mention hashtag" rel="tag">#<span>wireguard</span></a> tunnels. The hosts in the LAN copy the certs they need in this way. Systemd timers automate this &quot;pulling&quot;. I only had to write 10 lines of bash code, in the way of actual programming.</p>
aiyion<p>Der neue OpenWrt One spricht Freifunk.<br>Und da das LeineLab über einen hervorragenden Laser verfügt, haben wir die Skyline Hannovers verstetigt.</p><p>Richtig gutes Gerät übrigens. WireGuard Speedtest Nutztraffic 330Mbit/s down, 230Mbit/s up.</p><p><a href="https://infosec.exchange/tags/freifunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freifunk</span></a> <a href="https://infosec.exchange/tags/gluon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gluon</span></a> <a href="https://infosec.exchange/tags/openwrt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openwrt</span></a> <a href="https://infosec.exchange/tags/leinelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leinelab</span></a> <a href="https://infosec.exchange/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <span class="h-card" translate="no"><a href="https://friendica.me/profile/freifunkh" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freifunkh</span></a></span></p>
↯ Klaatu - Some Brave Apollo ↯<p>WG Tunnel<br><a href="https://f-droid.org/packages/com.zaneschepke.wireguardautotunnel" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">f-droid.org/packages/com.zanes</span><span class="invisible">chepke.wireguardautotunnel</span></a></p><p>An alternative <a href="https://noauthority.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> client for <a href="https://noauthority.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> with additional features.<br><a href="https://noauthority.social/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> <a href="https://noauthority.social/tags/fdroid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fdroid</span></a> <a href="https://noauthority.social/tags/wgtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wgtunnel</span></a></p>
Michael Jack<p>I wanted to set up VPN with ad-blocking for laptop and mobile, for when away from home, so I installed FreeBSD 14.2 on a Raspberry Pi 4, because why not?</p><p>Followed:</p><p>1) <a href="https://www.zenarmor.com/docs/network-security-tutorials/how-to-install-wireguard-on-freebsd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zenarmor.com/docs/network-secu</span><span class="invisible">rity-tutorials/how-to-install-wireguard-on-freebsd</span></a> </p><p>2) <a href="https://it-notes.dragas.net/2023/09/23/make-your-own-vpn-freebsd-wireguard-ipv6-and-ad-blocking-included/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2023/09/23</span><span class="invisible">/make-your-own-vpn-freebsd-wireguard-ipv6-and-ad-blocking-included/</span></a></p><p>(only using IPv4)</p><p>Seems to work as intended, but I'm not sure if ~500 ms ping times are normal for 5G mobile connection through VPN.</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> <a href="https://fosstodon.org/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> <a href="https://fosstodon.org/tags/Unbound" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unbound</span></a></p>
Nathan Arthur<p>I set up a <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> VPN at home last night, and here's what I wish I knew before I started:</p><p>It's different than a regular VPN - it has no notion of "users", it just has "peers" which connect with mutually-validated keypairs, over UDP. Then network routing is handled on top of the base protocol. Every connection is natively two-way, but you can use routing rules to make it behave like a traditional VPN. (I saw someone compare it to a "virtual ethernet cable" and that felt right.)</p>
Bhante Subharo :xmpp:<p>Yes, for some reason, <a href="https://c.im/tags/KDE" class="mention hashtag" rel="tag">#<span>KDE</span></a> is way better than <a href="https://c.im/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a> Mint&#39;s Cinnamon (or Mate) desktop (LM22), when one has multiple <a href="https://c.im/tags/Wireguard" class="mention hashtag" rel="tag">#<span>Wireguard</span></a> connections. :dy62: </p><p>I&#39;m also really liking how the Bluetooth devices are connected to right from KDE&#39;s panel applet - several steps saved. Worked great.</p><p><a href="https://c.im/tags/Debian" class="mention hashtag" rel="tag">#<span>Debian</span></a> <a href="https://c.im/tags/trixie" class="mention hashtag" rel="tag">#<span>trixie</span></a> <a href="https://c.im/tags/LinuxMint" class="mention hashtag" rel="tag">#<span>LinuxMint</span></a></p>