

That’s not always the case. For instance https://github.com/kelseyhightower/nocode
That’s not always the case. For instance https://github.com/kelseyhightower/nocode
Fuckin seriously. No shit it was yesterday, but WHEN? I got like 200 messages “yesterday”, and they didn’t all come in at once.
“How dare she accuse us of doing evil things! We should do evil things to her as revenge.”
deleted by creator
deleted by creator
https://en.m.wikipedia.org/wiki/Blank_paper_protest has a list. It’s incomplete though. For instance it doesn’t mention Australia https://joinouramerica.org/when-even-a-blank-sign-is-a-crime/
I’m also interested. I migrated from mint to Credit Karma… what a complete shit show. I really miss ooold mint.
deleted by creator
deleted by creator
deleted by creator
deleted by creator
Why can’t god become a burning bush or something?
deleted by creator
deleted by creator
The political administration in USA is basically saying they don’t want to be a leader in scientific advances. What else do we expect to happen?
deleted by creator
I don’t think iOS allows multiple VPNs to be enabled simultaneously. There appears to be only one VPN on/off toggle switch. From what I’ve seen you can have different vpn profiles but only enable one at a time. I could be wrong though.
Desktop operating systems like macOS, Linux (did I mention yet that I use arch Linux?), BSD, and um… that other one… oh yeah, Windows do allow this. I’m sure there are a variety of compatibility problems, but in general, multiple VPNs with the same or even different technologies can work together.
WireGuard routes certain traffic from the client (your iPhone) through the server (the computer at your house). If you route all traffic, then when your iPhone accesses the internet, it’s as if you were at home. Since that WireGuard server is sitting on your home LAN, it is able to route your phones traffic to anything else on that LAN, or out to the internet.
Wireguard clients have a setting called AllowedIPs that tells the client what IP subnets to route through the server. By default this is 0.0.0.0/0, ::/0
, which means “all ipv4 and all ipv6 traffic”. But If all you want to access are services on your home LAN, then you change that to 192.168.0.0/24
or whatever your home subnet is, and only traffic heading to that network will be routed through the WireGuard server at your house, but all other traffic goes out of your phone’s normal network paths to the internet.
Some routers even run WireGuard natively :) like for instance Ubiquiti. Personally I’d rather run it on my own server though because ubiquiti doesn’t have easy IAC features.
https://pages.cloudflare.com/
https://docs.gitlab.com/user/project/pages/