This Sunday the 14th of March, in the Netherlands, both in the streets and online, please join! ♻️

coders curfew: do what you love like you always do, but without FOMO

Hi @lain just read your encryption article after you mentioned it on I was wondering if you know about MLS. Something I stumbled upon last weekend and looks interesting. It's an IETF effort and focuses on scaling secure group chat: There's also a reference implementation: and an attempt at a federation draft (, but it looks like the main focus is currently still on centralized systems.

Big thanks to Julian Assange and for their reliable track record of servicing the public at large with truthful and original information that deviates sharply with the official narrative and exposes war crimes, financial crimes and illegal spying. Don't shoot the messenger,

Running a pledged Nym mixnode on OpenBSD. 😎 First encounter with Rust, compile-times do not come cheap :O

Whenever I go outside, I'm astonished by how hi-res everything looks! 😲

WireSep v0.11.3 is out, it contains quite a bunch reliability fixes, especially related to potential deadlocks on transient socket errors.

Thanks to the community in providing me with a macppc so I can now properly stress test from home with all the devices I have. :)

SHA256 (wiresep-0.11.3.tar.gz) = uvhWBE7V9C7Zqms7ApSiFODi7thN7jO+QM2BBtFFBK8=

I've been able to weed out some more bugs in WireSep related to client-only mode and macppc (having a machine with a connection fast enough to route all my traffic through really helps).

Help with testing the latest commits would be highly appreciated, also if you only use it as a server. I hope to release another bugfix release by tomorrow if all goes well..

Note that the project and repository are no longer at GitHub but are now located at

Now is a good time to help testing WireSep so that it is as good as it can be for the upcoming OpenBSD 6.7 release.

If you're on a recent snapshot, just run `pkg_add wiresep` and it will install the latest version (which is 0.11.1) or download it from

In the name of freedom and independence I've moved WireSep away from GitHub to my own domain. It's new home is a simple static site hosted on OpenBSD. Now we can explore the project in peace without being tracked by Silicon Valley 😎

WireSep v0.11.0 is out!

WireSep is a privilege separated implementation of WireGuard for OpenBSD.

Some highlights:
* wiresep-keygen(1) now securely stores keys in a file so no more copy/pasting
* proper support for big-endian systems
* various other improvements and fixes

Note: when upgrading from a previous version, please rename your private key files:
# cd /etc/wiresep &&
for _f in `ls *.key`; do mv "$_f" ${_f%.key}.privkey; done

first steps in a sparc64 system, supercool! somehow feels as exciting as watching the "unix system" scene of Jurassic Park as a kid back in 1993 ;) @stsp big thanks for helping me out 😃

who wants to be my sparc64 vdom friend? ;) (i'd like to test wiresep on it)

What would be the cheapest option to have an OpenBSD system on big-endian? I'd like to be able to test wiresep on it. I know about the EdgeRouter Lite, but I find EUR 100,- a bit expensive for something I don't really need personally.

And here is WireSep v0.10.1 already 😂 While I was preparing a package for ports I saw it contained two patches for building on 32-bit archs that I've now upstreamed in this release.

Get the source here: or wait until a nearby mirror gets the updated package 😎

Show older

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!