Aug. 26, 2024
Way Past Over the years, I have enjoyed various tablet computing. An HP PDA in the late 90’s, with not amazing Windows CE. A Nokia N770 in the 00’s with the delightful debian build. An ASUS Transformer (TF101) tablet with Android, and the detachable keyboard for added battery in the early 10’s.
Motivation All of these served different elements of the goal that perhaps many of us hope for, and no single device meets the needs for everyone.
Apr. 30, 2024
So it’s time to think of your GPG keys again.
simple solutions Note: I’ve used the wayback machine for the links, because even in my own notes some of the sites I used have since gone offline.
General GPG Cheat Sheet (gock.net 2020)
common approach (which is likely the widest recommendation): First off, go ahead and generate a revocation for your current key that you keep in a password wallet. It’s like a burn-letter that if you ever did lose your secret-key or needed to burn your existing key, you can push it.
Dec. 17, 2022
Overview Want to peer wireguard networks, and isolate it down to a single port of a service that is visible on that interface.
For this exercise, we want to expose only port 8096 TCP.
TL;DR; it was not just as simple as the first examples you see here. Read to the end for the solution.
Also!: I’m no expert on all this, so please reach out to me with corrections or improvements vbatts at hashbangbash dot com