<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 04:05:12 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Wireguard”</title>
    <link>https://techsnap.systems/tags/wireguard</link>
    <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>426: Storage Stories</title>
  <link>https://techsnap.systems/426</link>
  <guid isPermaLink="false">658dd254-b721-4281-8415-9357e180e92b</guid>
  <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/658dd254-b721-4281-8415-9357e180e92b.mp3" length="22528023" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</itunes:subtitle>
  <itunes:duration>31:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  
Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD. 
</description>
  <itunes:keywords>WireGuard, Linux 5.6, kernel module, networking, encryption, security, Ubuntu, Debian, Windows, zonefs, Zoned Storage, SMR, Shingled Magnetic Recording, SSD, NVMe, firmware, block device, dm-zoned, filesystems, device mapper, Western Digital, ZFS, RAID, Seagate, Microsoft, Samsung, Google, Andoird, Paragon Software, exFAT, FUD, open source, free software, NTFS, NTFS-3G, SMB, Samba, Cloudfare, crypto, dm-crypt, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>422: Multipath Musings</title>
  <link>https://techsnap.systems/422</link>
  <guid isPermaLink="false">7c9cef4d-3995-411c-9613-8e74e8156f5a</guid>
  <pubDate>Fri, 07 Feb 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7c9cef4d-3995-411c-9613-8e74e8156f5a.mp3" length="17013783" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:subtitle>
  <itunes:duration>23:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal. 
</description>
  <itunes:keywords>Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>419: Nebulous Networking</title>
  <link>https://techsnap.systems/419</link>
  <guid isPermaLink="false">9a06579c-89cb-4562-a2bc-09199c6790f5</guid>
  <pubDate>Fri, 27 Dec 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/9a06579c-89cb-4562-a2bc-09199c6790f5.mp3" length="24506008" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</itunes:subtitle>
  <itunes:duration>33:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network. 
</description>
  <itunes:keywords>VPN,Nebula, Slack, Ryan Huber, WireGuard,mesh network,mesh VPN,mesh networking,networking,security,security groups,UDP, AT,NAT busting,UDP hole-punching,cloud,system administration,firewall, lighthouse, encryption, Noise Protocol Framework, cryptography, overlay network, flat network, virtual network, DeOldify,Jupyter notebook, Machine Learning, Artificial Intelligence, neural networks, Plinko, pachinko, ImageNet,  GPU, Google Colab, Colab, DevOps, TechSNAP, Jupiter Broadcasting,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</p><p>Links:</p><ul><li><a title="Introducing Nebula, the open source global overlay network from Slack" rel="nofollow" href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579">Introducing Nebula, the open source global overlay network from Slack</a></li><li><a title="nebula: A scalable overlay networking tool with a focus on performance, simplicity and security" rel="nofollow" href="https://github.com/slackhq/nebula">nebula: A scalable overlay networking tool with a focus on performance, simplicity and security</a></li><li><a title="Nebula VPN routes between hosts privately, flexibly, and efficiently" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/nebula-vpn-routes-between-hosts-privately-flexibly-and-efficiently/">Nebula VPN routes between hosts privately, flexibly, and efficiently</a></li><li><a title="How to set up your own Nebula mesh VPN, step by step" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-own-nebula-mesh-vpn-step-by-step/">How to set up your own Nebula mesh VPN, step by step</a></li><li><a title="LINUX Unplugged 329: Flat Network Truthers" rel="nofollow" href="https://linuxunplugged.com/329">LINUX Unplugged 329: Flat Network Truthers</a></li><li><a title="Cloudy with a chance of neurons: The tools that make neural networks work" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/so-you-want-to-build-a-neural-network-the-cloud-can-help-with-that/">Cloudy with a chance of neurons: The tools that make neural networks work</a></li><li><a title="Welcome To Colaboratory" rel="nofollow" href="https://colab.research.google.com/notebooks/welcome.ipynb">Welcome To Colaboratory</a></li><li><a title="ImageColorizer Notebook" rel="nofollow" href="https://colab.research.google.com/github/jantic/DeOldify/blob/master/ImageColorizerColab.ipynb">ImageColorizer Notebook</a></li><li><a title="DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)" rel="nofollow" href="https://github.com/jantic/DeOldify">DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</p><p>Links:</p><ul><li><a title="Introducing Nebula, the open source global overlay network from Slack" rel="nofollow" href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579">Introducing Nebula, the open source global overlay network from Slack</a></li><li><a title="nebula: A scalable overlay networking tool with a focus on performance, simplicity and security" rel="nofollow" href="https://github.com/slackhq/nebula">nebula: A scalable overlay networking tool with a focus on performance, simplicity and security</a></li><li><a title="Nebula VPN routes between hosts privately, flexibly, and efficiently" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/nebula-vpn-routes-between-hosts-privately-flexibly-and-efficiently/">Nebula VPN routes between hosts privately, flexibly, and efficiently</a></li><li><a title="How to set up your own Nebula mesh VPN, step by step" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-own-nebula-mesh-vpn-step-by-step/">How to set up your own Nebula mesh VPN, step by step</a></li><li><a title="LINUX Unplugged 329: Flat Network Truthers" rel="nofollow" href="https://linuxunplugged.com/329">LINUX Unplugged 329: Flat Network Truthers</a></li><li><a title="Cloudy with a chance of neurons: The tools that make neural networks work" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/so-you-want-to-build-a-neural-network-the-cloud-can-help-with-that/">Cloudy with a chance of neurons: The tools that make neural networks work</a></li><li><a title="Welcome To Colaboratory" rel="nofollow" href="https://colab.research.google.com/notebooks/welcome.ipynb">Welcome To Colaboratory</a></li><li><a title="ImageColorizer Notebook" rel="nofollow" href="https://colab.research.google.com/github/jantic/DeOldify/blob/master/ImageColorizerColab.ipynb">ImageColorizer Notebook</a></li><li><a title="DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)" rel="nofollow" href="https://github.com/jantic/DeOldify">DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>413: The Coffee Shop Problem</title>
  <link>https://techsnap.systems/413</link>
  <guid isPermaLink="false">2c022259-3aec-490f-b2e3-0560336bafce</guid>
  <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2c022259-3aec-490f-b2e3-0560336bafce.mp3" length="23110449" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
</itunes:subtitle>
  <itunes:duration>32:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. 
</description>
  <itunes:keywords>DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>409: Privacy Perspectives</title>
  <link>https://techsnap.systems/409</link>
  <guid isPermaLink="false">fb83ed86-b76d-4837-ac24-17ceb1f787aa</guid>
  <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fb83ed86-b76d-4837-ac24-17ceb1f787aa.mp3" length="28249466" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:subtitle>
  <itunes:duration>39:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp. 
</description>
  <itunes:keywords>Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>397: Quality Tools</title>
  <link>https://techsnap.systems/397</link>
  <guid isPermaLink="false">a6b87767-ad4e-429f-b82a-703023411eb6</guid>
  <pubDate>Thu, 14 Feb 2019 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a6b87767-ad4e-429f-b82a-703023411eb6.mp3" length="29268241" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.</itunes:subtitle>
  <itunes:duration>40:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. 
Plus the importance of sane defaults and why netdata belongs on every system. 
</description>
  <itunes:keywords>bitorrent,latency,qos,bandwidth,networking,command line,wondershaper,tc,traffic control,queing discipline,network discipline ,FireHOL,FireQOS,netdata,qdisc,queues,traffic shaping,sane defaults,rate limit,tcp,udp,iptables,firewall,routing,home networking,netdata,monitoring,networking engineering,mpls,vpn,wireguard,openvpn,gre,bufferbloat,munin,nagios,collectd,prometheus,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 390: What’s Up with WireGuard</title>
  <link>https://techsnap.systems/390</link>
  <guid isPermaLink="false">6cd3cd3c-79c7-4978-8102-042f935a1344</guid>
  <pubDate>Thu, 22 Nov 2018 10:30:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6cd3cd3c-79c7-4978-8102-042f935a1344.mp3" length="29616549" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</itunes:subtitle>
  <itunes:duration>34:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.
</description>
  <itunes:keywords>WireGuard, VPN, IPSEC, Linux, Algo, Private Networking, Jim Salter, ssh, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 349: All Natural Namespaces</title>
  <link>https://techsnap.systems/349</link>
  <guid isPermaLink="false">1f0cbb01-a231-4cf6-9f5d-f3ded5714065</guid>
  <pubDate>Thu, 21 Dec 2017 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1f0cbb01-a231-4cf6-9f5d-f3ded5714065.mp3" length="36892159" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
</itunes:subtitle>
  <itunes:duration>50:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back. 
</description>
  <content:encoded>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
