<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: ByteKnight</title>
    <description>The latest articles on Forem by ByteKnight (@byteknight).</description>
    <link>https://forem.com/byteknight</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3199722%2F255b6b94-7ed1-44f1-9ce1-8bae0c69fea4.png</url>
      <title>Forem: ByteKnight</title>
      <link>https://forem.com/byteknight</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/byteknight"/>
    <language>en</language>
    <item>
      <title>LinkedIn "BrowserGate"</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Mon, 06 Apr 2026 17:22:36 +0000</pubDate>
      <link>https://forem.com/byteknight/linkedin-browsergate-3bnj</link>
      <guid>https://forem.com/byteknight/linkedin-browsergate-3bnj</guid>
      <description>&lt;p&gt;An investigation alleges LinkedIn secretly scans users' browsers for 6,000+ extensions-potentially revealing sensitive personal data-and shares it with third parties, without clear consent. LinkedIn denies wrongdoing, stating the practice is solely for security and anti-abuse purposes. The controversy raises major GDPR and privacy concerns, but no regulatory ruling has yet been issued.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://cybernews.com/privacy/linkedin-surveillance-browsergate/" rel="noopener noreferrer"&gt;Original Article&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>🧅 Oniux: Tor Routing for Linux</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Mon, 15 Sep 2025 14:25:32 +0000</pubDate>
      <link>https://forem.com/byteknight/oniux-tor-routing-for-linux-1abh</link>
      <guid>https://forem.com/byteknight/oniux-tor-routing-for-linux-1abh</guid>
      <description>&lt;p&gt;The Tor Project just dropped &lt;a href="https://blog.torproject.org/introducing-oniux-tor-isolation-using-linux-namespaces/" rel="noopener noreferrer"&gt;Oniux&lt;/a&gt;, a powerful command-line tool that routes any Linux app through the Tor network—safely and leak-proof. Unlike torsocks, Oniux uses kernel namespaces and a virtual interface (onion0) to isolate traffic at the system level. Built with Rust, it’s fast, secure, and perfect for privacy-critical tasks.&lt;/p&gt;

&lt;p&gt;Try it:&lt;br&gt;&lt;br&gt;
&lt;code&gt;bash&lt;br&gt;
oniux firefox&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Total anonymity, no shortcuts.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>cybersecurity</category>
      <category>tor</category>
    </item>
    <item>
      <title>Element: The Open-Source Federated System for Secure Messaging, Voice, and Video</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Fri, 05 Sep 2025 06:32:51 +0000</pubDate>
      <link>https://forem.com/byteknight/element-the-open-source-federated-system-for-secure-messaging-voice-and-video-3po0</link>
      <guid>https://forem.com/byteknight/element-the-open-source-federated-system-for-secure-messaging-voice-and-video-3po0</guid>
      <description>&lt;h2&gt;
  
  
  Discover Element: The Open-Source Federated System for Secure Messaging, Voice, and Video
&lt;/h2&gt;

&lt;p&gt;Element is a free, open-source app built on the &lt;strong&gt;Matrix protocol&lt;/strong&gt;. It enables secure chats, voice calls, and video calls with &lt;strong&gt;end-to-end encryption (E2EE)&lt;/strong&gt;, group rooms, and file sharing.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why Element Stands Out
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Federated &amp;amp; Decentralized&lt;/strong&gt; – Communicate across different servers without vendor lock-in.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data Ownership&lt;/strong&gt; – Self-host or use public servers while keeping control of your privacy.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Open Source&lt;/strong&gt; – Transparent and community-driven (AGPLv3/GPLv3).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Platform&lt;/strong&gt; – Works on web, desktop, and mobile with synced chat history.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bridging&lt;/strong&gt; – Connects with Slack, IRC, Telegram, Jitsi, and more.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Trusted&lt;/strong&gt; – Used by journalists and governments for secure communications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;p&gt;Matrix replicates messages across federated servers, cryptographically signed to prevent tampering. Even if a server fails, your communication continues securely.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;Element is ideal for teams, communities, and individuals who want &lt;strong&gt;secure, private, and interoperable communication&lt;/strong&gt; without relying on centralized providers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://element.io/" rel="noopener noreferrer"&gt;https://element.io/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>android</category>
      <category>cybersecurity</category>
      <category>web3</category>
      <category>mobile</category>
    </item>
    <item>
      <title>Prompt engineering: it's not really engineering.</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Wed, 03 Sep 2025 09:12:50 +0000</pubDate>
      <link>https://forem.com/byteknight/prompt-engineering-its-not-really-engineering-35oo</link>
      <guid>https://forem.com/byteknight/prompt-engineering-its-not-really-engineering-35oo</guid>
      <description>&lt;p&gt;There's no magical or tricky way to ask questions to a language model.&lt;br&gt;&lt;br&gt;
Even if you manage to craft a clever prompt, if you don't understand the answer, it's useless.&lt;br&gt;&lt;br&gt;
The most effective way to interact with an LLM is to genuinely understand the topic you're asking about.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>promptengineering</category>
      <category>coding</category>
      <category>learning</category>
    </item>
    <item>
      <title>Orbot for Android: Secure Your Traffic with Tor</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Tue, 02 Sep 2025 14:31:59 +0000</pubDate>
      <link>https://forem.com/byteknight/orbot-for-android-secure-your-traffic-with-tor-mfa</link>
      <guid>https://forem.com/byteknight/orbot-for-android-secure-your-traffic-with-tor-mfa</guid>
      <description>&lt;h1&gt;
  
  
  Orbot for Android: Secure Your Traffic with Tor
&lt;/h1&gt;

&lt;p&gt;When we talk about privacy on mobile devices, Android often leaves users exposed. Apps constantly collect data, networks track your activity, and websites fingerprint your device. If you want to reduce your digital footprint, &lt;strong&gt;Orbot&lt;/strong&gt; is a great starting point.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Orbot?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://guardianproject.info/apps/org.torproject.android/" rel="noopener noreferrer"&gt;Orbot&lt;/a&gt; is a free and open-source proxy app for Android that routes your internet traffic through the &lt;strong&gt;Tor network&lt;/strong&gt;. This means your traffic is encrypted and anonymized, making it much harder for anyone  - your ISP, apps, or even governments  - to track what you're doing online.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Use Orbot?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Anonymity&lt;/strong&gt; → Orbot masks your IP address and routes traffic through multiple relays.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Censorship Circumvention&lt;/strong&gt; → Access websites and services that may be blocked in your country or region.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Encryption&lt;/strong&gt; → Secure your data on untrusted networks, like public Wi-Fi.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integration&lt;/strong&gt; → Works not only with the Tor Browser but can also proxy traffic from other apps.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Get Started
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Download Orbot from &lt;a href="https://play.google.com/store/apps/details?id=org.torproject.android" rel="noopener noreferrer"&gt;Google Play&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Open the app and tap &lt;strong&gt;Start&lt;/strong&gt; to connect to the Tor network.&lt;/li&gt;
&lt;li&gt;(Optional) Configure your favorite apps to use Orbot as a proxy.&lt;/li&gt;
&lt;li&gt;For browsing, pair it with the &lt;strong&gt;Tor Browser for Android&lt;/strong&gt; for maximum privacy.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;If privacy matters to you, Orbot is an essential tool in your Android toolkit. It won't make you invincible online, but it does raise the bar against surveillance, data collection, and censorship.&lt;/p&gt;

&lt;h2&gt;
  
  
  Don't Forget to Share Bandwidth
&lt;/h2&gt;

&lt;p&gt;Tor only works because volunteers contribute bandwidth to the network. In Orbot, you can enable the option to act as a relay node, helping other users enjoy the same freedom and privacy you benefit from. If your connection and data plan allow it, consider sharing bandwidth - it makes the network stronger and faster for everyone.&lt;/p&gt;

</description>
      <category>android</category>
      <category>mobile</category>
      <category>cybersecurity</category>
      <category>opensource</category>
    </item>
    <item>
      <title>🧅The Onion Router: How Tor's Layers Create Online Anonymity</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Mon, 01 Sep 2025 07:11:27 +0000</pubDate>
      <link>https://forem.com/byteknight/the-onion-router-how-tors-layers-create-online-anonymity-1p54</link>
      <guid>https://forem.com/byteknight/the-onion-router-how-tors-layers-create-online-anonymity-1p54</guid>
      <description>&lt;p&gt;&lt;strong&gt;Unmasking Anonymity: A Deep Dive into Onion Routing and Tor&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ever wondered how it's possible to browse the internet anonymously? This video breaks down the fascinating technology behind onion routing, using Tor (The Onion Router) as a prime example. This technology isn't about encrypting your messages for confidentiality; it's about making it impossible for anyone to even know you sent a message in the first place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works: Layers of Secrecy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The core principle of onion routing is to bounce your connection through multiple intermediate computers, called nodes, before it reaches its final destination. In Tor's case, your connection takes a three-hop journey. But the real magic lies in the encryption.&lt;/p&gt;

&lt;p&gt;Imagine your message as an onion. Before it's sent, it's wrapped in multiple layers of encryption, each with a unique key. As the message travels through the network, each node peels off one layer of encryption, revealing the next destination in the chain. This process continues until the final node, the "exit node", removes the last layer of encryption and sends your message to its destination. The response from the website you're visiting follows the same path in reverse, with each node adding a layer of encryption back on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Power of Anonymity&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This clever system ensures that no single node in the network knows the entire path of your connection. The first node knows who you are but not where you're going. The last node knows your destination but not who you are. And the middle node? It knows neither.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Trade-offs: Speed and Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While Tor provides a powerful tool for anonymity, it's not without its drawbacks. The multiple hops and layers of encryption can slow down your connection. More importantly, it's not a silver bullet for all security concerns. If the website you're visiting doesn't use HTTPS, your data can be intercepted at the exit node. Additionally, sophisticated attackers who control both the entry and exit nodes of your connection could potentially de-anonymize you through traffic analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The video provides a clear and concise explanation of how onion routing and Tor work, highlighting both their strengths and weaknesses. It's a must-watch for anyone interested in understanding the technology behind Tor.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=QRYzre4bf7I&amp;amp;t=206s&amp;amp;ab_channel=Computerphile" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=QRYzre4bf7I&amp;amp;t=206s&amp;amp;ab_channel=Computerphile&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tor</category>
      <category>onionrouting</category>
      <category>darkweb</category>
      <category>security</category>
    </item>
    <item>
      <title>Open Source is one person</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Fri, 29 Aug 2025 17:32:59 +0000</pubDate>
      <link>https://forem.com/byteknight/open-source-is-one-person-22d6</link>
      <guid>https://forem.com/byteknight/open-source-is-one-person-22d6</guid>
      <description>&lt;p&gt;The article “&lt;a href="https://opensourcesecurity.io/2025/08-oss-one-person/" rel="noopener noreferrer"&gt;Open Source is one person&lt;/a&gt;” by Josh Bressers explores a startling truth about the open source ecosystem: &lt;strong&gt;most open source projects are maintained by just one person&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧩 Key Takeaways:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Scale of Solo Maintenance&lt;/strong&gt;: Out of 11.8 million projects tracked by ecosyste.ms, around 7 million are maintained by a single individual. Many of the remaining projects lack maintainer data, suggesting the true number is even higher.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Popular ≠ Well-Resourced&lt;/strong&gt;: Even among the most downloaded NPM packages (over 1 million downloads/month), nearly half are maintained by just one person. This trend persists across ecosystems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security &amp;amp; Risk&lt;/strong&gt;: The real supply chain risk isn’t where a maintainer lives—it’s that they’re often underpaid, overworked, and unsupported. Demonizing developers based on nationality (as seen in a recent Register article) misses the point entirely.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Call to Action&lt;/strong&gt;: Instead of scapegoating individual maintainers, the community should focus on supporting them. The author admits there’s no easy fix, but emphasizes that vilifying solo contributors is not the answer.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Final Thought:
&lt;/h3&gt;

&lt;p&gt;Open source powers the digital world—Harvard estimates its economic value at $8.8 trillion. Yet, much of it rests on the shoulders of individuals working alone. That’s the real vulnerability.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>software</category>
      <category>developers</category>
    </item>
    <item>
      <title>🔄 Syncthing: The Open‑Source Way to Keep Your Files in Sync</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Fri, 29 Aug 2025 15:20:04 +0000</pubDate>
      <link>https://forem.com/byteknight/syncthing-the-open-source-way-to-keep-your-files-in-sync-1hfa</link>
      <guid>https://forem.com/byteknight/syncthing-the-open-source-way-to-keep-your-files-in-sync-1hfa</guid>
      <description>&lt;p&gt;Tired of juggling USB drives or trusting your personal files to someone else's cloud? &lt;strong&gt;Syncthing&lt;/strong&gt; is a free, open‑source, peer‑to‑peer file sync tool that puts &lt;em&gt;you&lt;/em&gt; in control. It's built for privacy 🔒, security 🛡️, and flexibility — and it works seamlessly across devices.  &lt;/p&gt;

&lt;h3&gt;
  
  
  What is Syncthing? 💡
&lt;/h3&gt;

&lt;p&gt;Syncthing connects your devices directly, syncing files without a central server. Whether you're keeping work documents aligned between your laptop and phone or sharing project folders with a team, your data stays private, encrypted, and entirely under your control. It runs on Windows, macOS, Linux, Android, and more — so your setup can be as simple or as cross‑platform as you like.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Why People Choose Syncthing
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Privacy First&lt;/strong&gt; – No third‑party servers. Your files never leave your devices, and all transfers are encrypted with TLS.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Open Source&lt;/strong&gt; – Transparent, community‑driven, and licensed under the Mozilla Public License 2.0.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Flexible Syncing&lt;/strong&gt; – Pick the folders, choose one‑way or two‑way sync, and enable versioning to keep older file copies.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Accounts, No Subscriptions&lt;/strong&gt; – Install, connect devices with a unique ID, and start syncing — no sign‑ups required.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How to Get Started 🚀
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Download &amp;amp; Install&lt;/strong&gt; – Grab Syncthing from &lt;a href="https://syncthing.net" rel="noopener noreferrer"&gt;syncthing.net&lt;/a&gt; for your desktop OS. On Android, find it on Google Play or F‑Droid.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Connect Devices&lt;/strong&gt; – Each device gets a unique ID. Share it securely to link them.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Select Folders&lt;/strong&gt; – Choose what to sync and set permissions (read‑only or read‑write).
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Let It Run&lt;/strong&gt; – Syncthing works quietly in the background, keeping your files up to date everywhere.
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>opensource</category>
      <category>backup</category>
      <category>android</category>
      <category>linux</category>
    </item>
    <item>
      <title>🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Thu, 28 Aug 2025 10:05:21 +0000</pubDate>
      <link>https://forem.com/byteknight/crowdsec-open-source-crowd-powered-defense-14c3</link>
      <guid>https://forem.com/byteknight/crowdsec-open-source-crowd-powered-defense-14c3</guid>
      <description>&lt;p&gt;Tired of fighting cyber threats alone? &lt;strong&gt;CrowdSec&lt;/strong&gt; turns security into a &lt;em&gt;team sport&lt;/em&gt;. It’s a free, open‑source IDS/IPS and WAF that detects suspicious activity, blocks bad actors, and shares threat intel with a global community.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s different:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Crowdsourced protection&lt;/strong&gt; – one detects, all defend.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Flexible remediation&lt;/strong&gt; – block, challenge, or throttle threats at the right layer.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross‑platform&lt;/strong&gt; – Linux, Windows, Docker, Kubernetes, and more.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How it works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Detect attacks from logs and traffic.
&lt;/li&gt;
&lt;li&gt;Apply countermeasures.
&lt;/li&gt;
&lt;li&gt;Share intel with the network.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Get started:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-s&lt;/span&gt; https://install.crowdsec.net | bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;🔗 &lt;a href="https://github.com/crowdsecurity/crowdsec" rel="noopener noreferrer"&gt;GitHub Repo&lt;/a&gt;&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>multiplatform</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Yggdrasil Network — Join the Global Mesh</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Wed, 27 Aug 2025 08:45:10 +0000</pubDate>
      <link>https://forem.com/byteknight/yggdrasil-network-join-the-global-mesh-1kcc</link>
      <guid>https://forem.com/byteknight/yggdrasil-network-join-the-global-mesh-1kcc</guid>
      <description>&lt;p&gt;The &lt;strong&gt;Yggdrasil Network&lt;/strong&gt; is an experimental, end‑to‑end encrypted IPv6 overlay that links nodes into a &lt;strong&gt;self‑healing, decentralized mesh&lt;/strong&gt;. It’s lightweight, transport‑agnostic, and operates without central servers — ideal for privacy‑minded networking, resilient communication, and experimentation.&lt;/p&gt;

&lt;h3&gt;
  
  
  ⚡ Quick Connect
&lt;/h3&gt;

&lt;p&gt;Once Yggdrasil is installed and running, you can join the mesh instantly by adding a public peer:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;yggdrasilctl addPeer &lt;span class="nv"&gt;uri&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;tcp://51.15.204.214:12345
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can also choose from the &lt;a href="https://github.com/yggdrasil-network/public-peers" rel="noopener noreferrer"&gt;public peers list&lt;/a&gt; for more options.&lt;/p&gt;




&lt;h3&gt;
  
  
  🌍 Reaching Other Hosts in the Mesh
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Find your Yggdrasil IPv6 address:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   ip addr
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Look for the address starting with &lt;code&gt;20...&lt;/code&gt; (the mesh prefix).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use that address to connect to other nodes directly.
For example:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   ping 201:f095:565e:fe6c:a7f2:c641:ecad:78c1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;p&gt;💡 &lt;strong&gt;Tip:&lt;/strong&gt; Once connected, you can run services bound to your Yggdrasil IPv6 for secure, mesh‑only access.&lt;/p&gt;

</description>
      <category>meshnetworking</category>
      <category>p2p</category>
      <category>yggdrasil</category>
      <category>vpn</category>
    </item>
    <item>
      <title>Farley on vibe coding</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Tue, 26 Aug 2025 09:32:57 +0000</pubDate>
      <link>https://forem.com/byteknight/farley-on-vibe-coding-1ki1</link>
      <guid>https://forem.com/byteknight/farley-on-vibe-coding-1ki1</guid>
      <description>&lt;p&gt;In a video from the "Modern Software Engineering" channel, Dave Farley discusses why he considers "vibe coding" the "worst software idea of the year." He argues that this approach, which relies heavily on AI to generate code, misses the core purpose of programming.&lt;/p&gt;

&lt;p&gt;According to Farley, programming is not just about writing code; it's about breaking down complex problems into precise instructions and communicating ideas effectively to other developers.&lt;/p&gt;

&lt;p&gt;He identifies three key problems with AI-driven "vibe coding": the lack of precision in specifying requirements, the critical need for automated testing to verify the AI's output, and the difficulty of making incremental changes to the generated codebase. He concludes that successful software is defined by its ability to be easily changed, a characteristic that "vibe coding" fails to support.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/1A6uPztchXk?si=Umn4h1PG6IWhDfOH" rel="noopener noreferrer"&gt;https://youtu.be/1A6uPztchXk?si=Umn4h1PG6IWhDfOH&lt;/a&gt;&lt;/p&gt;

</description>
      <category>vibecoding</category>
      <category>softwaredevelopment</category>
      <category>softwareengineering</category>
      <category>farley</category>
    </item>
    <item>
      <title>sshuttle</title>
      <dc:creator>ByteKnight</dc:creator>
      <pubDate>Mon, 25 Aug 2025 11:00:07 +0000</pubDate>
      <link>https://forem.com/byteknight/sshuttle-15l5</link>
      <guid>https://forem.com/byteknight/sshuttle-15l5</guid>
      <description>&lt;p&gt;sshuttle is a handy tool for routing traffic through an SSH server, acting like a lightweight VPN. It’s easy to use and doesn’t require admin rights on the remote host.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sshuttle &lt;span class="nt"&gt;-r&lt;/span&gt; user@remotehost 0.0.0.0/0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command forwards all traffic through remotehost via SSH. Just replace user@remotehost with your actual SSH login.&lt;/p&gt;

&lt;p&gt;More details here: &lt;a href="https://github.com/sshuttle/sshuttle" rel="noopener noreferrer"&gt;https://github.com/sshuttle/sshuttle&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
