Learn how to give a Tailscale user on another tailnet access to a private machine within your tailnet, without exposing the machine publicly.| Tailscale
Find out how to automatically register DNS names for devices in your Tailscale network.| Tailscale
Anything that uses encryption to keep content away from spying eyes. End-to-end encryption is the best, because there need be no trusted intermediary. Some software projects are always fully end-to-end encrypted. Examples include NNCP, Syncthing, Yggdrasil, and Gemini. For more on encryption, see: OpenPGP tools: GnuPG (GPG) Sequoia PGP Age (Encryption) signify (not encryption, but cryptographic authentication) Links to this note Encrypting Filespooler Jobs With Age Like the process described ...| www.complete.org
A network in which the nodes typically discover each other and the routes between each other automatically. Examples of mesh networks include Yggdrasil, Meshtastic, and Syncthing. A basic description of mesh networking is at https://en.wikipedia.org/wiki/Mesh_networking Some of my articles about mesh networking include: Easily Accessing All Your Stuff with a Zero-Trust Mesh VPN, which discusses different types of meshes as VPNs. Using Yggdrasil As an Automatic Mesh Fabric to Connect All Your ...| www.complete.org
Here are some (potentially) interesting topics you can find here: Old and Small Technology and benefits to us today NNCP, which is an Asynchronous, Encrypted, onion-routed, offline-capable way to send data and execute remote commands. Yggdrasil, a network using IPv6 space where IPs are linked to public keys How this site is built (hint: it’s exported from Emacs!) Amateur Radio ZFS on Linux Long-Distance Train Travel in the USA The Grumpy Cricket - an interactive fiction game for children So...| www.complete.org