I hereby claim:
- I am phiberoptick on github.
- I am phiber (https://keybase.io/phiber) on keybase.
- I have a public key ASDtb6Z2HjTDTjY6JaLTy-Pq_0xCHxkkiM4-1-ZFN2u5_Qo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Ignore all that craziness below. These can be set from the cli with the "pritunl" command. | |
The commands below can be used to get/set the values of the cert, key, port and if the :80 -> "app.server_port" redirect is active. | |
# Get current SSL server cert: | |
pritunl get app.server_cert | |
# Get current SSL server key: | |
pritunl get app.server_key |
A curated list of arrrrrrrrr!
Press minus + shift + s
and return
to chop/fold long lines!
Instructions to obtain WireGuard details of your NordVPN account. These can be used to setup a WireGuard tunnel on your router to NordVPN.
Source: https://forum.gl-inet.com/t/configure-wireguard-client-to-connect-to-nordvpn-servers/10422/27
If you have any linux machine, use that or install a vm if you don't have one.
Get their official linux app installed. Make sure you have wireguard installed too. And set the used technology to Nordlynx by running nordvpn set technology nordlynx