# I am the Watcher. I am your guide through this vast new twtiverse.
#
# Usage:
# https://watcher.sour.is/api/plain/users View list of users and latest twt date.
# https://watcher.sour.is/api/plain/twt View all twts.
# https://watcher.sour.is/api/plain/mentions?uri=:uri View all mentions for uri.
# https://watcher.sour.is/api/plain/conv/:hash View all twts for a conversation subject.
#
# Options:
# uri Filter to show a specific users twts.
# offset Start index for quey.
# limit Count of items to return (going back in time).
#
# twt range = 1 61019
# self = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=51691
# next = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=51791
# prev = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=51591
@movq I _think_ I misunderstood some aspects of Wireguard as mentioned here, not 100% sure, but so far things are much happier now with assigning /32(s) as Tunnel IP(s) for Peers and being a bit more thoughtful about the AllowedIPs š¤ I'm only playing around with 3 devices right now, my core router (RouterOS), an Ubuntu 22.04 VM over at Vultr and my iPhone.
@movq I _think_ I misunderstood some aspects of Wireguard as mentioned here, not 100% sure, but so far things are much happier now with assigning /32(s) as Tunnel IP(s) for Peers and being a bit more thoughtful about the AllowedIPs š¤ I'm only playing around with 3 devices right now, my core router (RouterOS), an Ubuntu 22.04 VM over at Vultr and my iPhone.
@movq I _think_ I misunderstood some aspects of Wireguard as mentioned here, not 100% sure, but so far things are much happier now with assigning /32(s) as Tunnel IP(s) for Peers and being a bit more thoughtful about the AllowedIPs š¤ I'm only playing around with 3 devices right now, my core router (RouterOS), an Ubuntu 22.04 VM over at Vultr and my iPhone.
I _think_ this is what I was missing in my understanding:
> In other words, when sending packets, the list of allowed IPs behaves as a sort of routing table, and when > receiving packets, the list of allowed IPs behaves as a sort of access control list.
>
> This is what we call a Cryptokey Routing Table: the simple association of public keys and allowed IPs.
I _think_ this is what I was missing in my understanding:
> In other words, when sending packets, the list of allowed IPs behaves as a sort of routing table, and when > receiving packets, the list of allowed IPs behaves as a sort of access control list.
>
> This is what we call a Cryptokey Routing Table: the simple association of public keys and allowed IPs.
I _think_ this is what I was missing in my understanding:
> In other words, when sending packets, the list of allowed IPs behaves as a sort of routing table, and when > receiving packets, the list of allowed IPs behaves as a sort of access control list.
>
> This is what we call a Cryptokey Routing Table: the simple association of public keys and allowed IPs.
@movq What's your setup like? How many peers? How are they configured? (if you can share)
@movq What's your setup like? How many peers? How are they configured? (if you can share)
@movq What's your setup like? How many peers? How are they configured? (if you can share)
Hmmm really not getting this at al š¤¦āāļø So far things appear to be a bit more stable, but the only changes I made was to assign addresses to peers of the form 172.30.0.X/32 instead of 172.30.0.X/24 and setting AllowedIPs to 0.0.0.0/0 for mobile peers (phones, etc) and X.X.X.X/24, Y.Y.Y.Y/24 for more static peers (remote VMs) where X and Y are the LAN and Wireguard subnets.
Hmmm really not getting this at al š¤¦āāļø So far things appear to be a bit more stable, but the only changes I made was to assign addresses to peers of the form 172.30.0.X/32 instead of 172.30.0.X/24 and setting AllowedIPs to 0.0.0.0/0 for mobile peers (phones, etc) and X.X.X.X/24, Y.Y.Y.Y/24 for more static peers (remote VMs) where X and Y are the LAN and Wireguard subnets.
Hmmm really not getting this at al š¤¦āāļø So far things appear to be a bit more stable, but the only changes I made was to assign addresses to peers of the form 172.30.0.X/32 instead of 172.30.0.X/24 and setting AllowedIPs to 0.0.0.0/0 for mobile peers (phones, etc) and X.X.X.X/24, Y.Y.Y.Y/24 for more static peers (remote VMs) where X and Y are the LAN and Wireguard subnets.
Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure š¢ I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts š¤¦āāļø
Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure š¢ I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts š¤¦āāļø
Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure š¢ I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts š¤¦āāļø
Huh hmm Boring Proxy _actually_ uses SSH under the hood (_written in Go_) for the tunnelling š¤ Clever, I would have done the same if I hadn't learned about Wireguard š
Huh hmm Boring Proxy _actually_ uses SSH under the hood (_written in Go_) for the tunnelling š¤ Clever, I would have done the same if I hadn't learned about Wireguard š
Huh hmm Boring Proxy _actually_ uses SSH under the hood (_written in Go_) for the tunnelling š¤ Clever, I would have done the same if I hadn't learned about Wireguard š
@mckinley Now that I have real experience with Wireguard, I'm seriously thinking about building my own "Cloudflare" replacement infra š
-- And commodifying that somehow. Boring Proxy kind of does this too, but I may have a slightly different takes on things š¤
@mckinley Now that I have real experience with Wireguard, I'm seriously thinking about building my own "Cloudflare" replacement infra š
-- And commodifying that somehow. Boring Proxy kind of does this too, but I may have a slightly different takes on things š¤
@mckinley Now that I have real experience with Wireguard, I'm seriously thinking about building my own "Cloudflare" replacement infra š
-- And commodifying that somehow. Boring Proxy kind of does this too, but I may have a slightly different takes on things š¤
I've set PersistentKeepAlive = 25 on both side. Let's see if that improves things a bit...
I've set PersistentKeepAlive = 25 on both side. Let's see if that improves things a bit...
I've set PersistentKeepAlive = 25 on both side. Let's see if that improves things a bit...
@movq Wow that is wicked cool! š
@movq Wow that is wicked cool! š
@movq Wow that is wicked cool! š
@movq Only problem I seem to have is the connection keeps dropping out and never re-connecting until I forcefully disconnect/reconnect one side. Hmm š¤
@movq Only problem I seem to have is the connection keeps dropping out and never re-connecting until I forcefully disconnect/reconnect one side. Hmm š¤
@movq Only problem I seem to have is the connection keeps dropping out and never re-connecting until I forcefully disconnect/reconnect one side. Hmm š¤
Wireguard is kind of cool š
Wireguard is kind of cool š
Wireguard is kind of cool š
@lyse Hahahahaha š¤£š¤£š¤£
@lyse Hahahahaha š¤£š¤£š¤£
@lyse Hahahahaha š¤£š¤£š¤£
@movq Oh nothing has changed for me 𤣠I stay away from humans as much as possible, never shake hands, refuse to use public transport, etc, etc
@movq Oh nothing has changed for me 𤣠I stay away from humans as much as possible, never shake hands, refuse to use public transport, etc, etc
@movq Oh nothing has changed for me 𤣠I stay away from humans as much as possible, never shake hands, refuse to use public transport, etc, etc
@lyse
> Finally, in this day and age I do enjoy that Iām not reachable everywhere
This is the primary reason why I NEVER install "Work" apps on my iPhone. I've gotten into the habit for many years now, never to mix work and personal stuff. If I'm not on my Work Macbook, I'm not available -- end of story.
@lyse
> Finally, in this day and age I do enjoy that Iām not reachable everywhere
This is the primary reason why I NEVER install "Work" apps on my iPhone. I've gotten into the habit for many years now, never to mix work and personal stuff. If I'm not on my Work Macbook, I'm not available -- end of story.
@lyse
> Finally, in this day and age I do enjoy that Iām not reachable everywhere
This is the primary reason why I NEVER install "Work" apps on my iPhone. I've gotten into the habit for many years now, never to mix work and personal stuff. If I'm not on my Work Macbook, I'm not available -- end of story.
@shreyan you know I've already done this right? š
@shreyan you know I've already done this right? š
@shreyan you know I've already done this right? š
@movq LOL š That game was freak'n awesome! š¤£
@movq LOL š That game was freak'n awesome! š¤£
@movq LOL š That game was freak'n awesome! š¤£
I play chess, is that considered retro gaming?! š
I play chess, is that considered retro gaming?! š
I play chess, is that considered retro gaming?! š
@lyse Haha that sounds like so much fun for the kids š
@lyse Haha that sounds like so much fun for the kids š
@lyse Haha that sounds like so much fun for the kids š
@movq Just flying down half a day early so not to stress too much š
@movq Just flying down half a day early so not to stress too much š
@movq Just flying down half a day early so not to stress too much š
@movq Cool! š I'm away interstate at the moment for a work thing š
@movq Cool! š I'm away interstate at the moment for a work thing š
@movq Cool! š I'm away interstate at the moment for a work thing š
@linux_gizmos Hmmm š¤ This is a cool looking embedded board! š
@linux_gizmos Hmmm š¤ This is a cool looking embedded board! š
@linux_gizmos Hmmm š¤ This is a cool looking embedded board! š
AmaIng that on these plane WiFi networks, clearly powered by satellites, even get this much bandwidth š

Latency is pretty piss poor, but you kind of expect that with a moving target š¤£
AmaIng that on these plane WiFi networks, clearly powered by satellites, even get this much bandwidth š

Latency is pretty piss poor, but you kind of expect that with a moving target š¤£
AmaIng that on these plane WiFi networks, clearly powered by satellites, even get this much bandwidth š

Latency is pretty piss poor, but you kind of expect that with a moving target š¤£
@juhi Hi š¤ Welcome to Twtxt š
@juhi Hi š¤ Welcome to Twtxt š
@juhi Hi š¤ Welcome to Twtxt š
@lyse The way you wrote this made you almost sound "Aussie" š¤£