

Good point about network availability and endpoints.
Good point about network availability and endpoints.
Since I have no patience, I’ll lay out some items for consideration.
1st, I wouldn’t rely on an ISP router to serve as my end point for a VPN. They likely have access to manage that device and it likely isn’t getting any updates. You are better off implementing it with your own equipment that you keep updated.
If you have a capable security device serving as your router to the external internet and you want full access to your internal network, then you might consider using a VPN that terminates at your router.
I myself am a fan of setting up a jump host and initiating a VPN connection directly to that host when using an agent based solution. Then you can monitor the host for activities, more easily keep your edge device patched, and then use the capabilities of your jump host to interact with the rest of your network. This would require either an agent to periodically poll a platform for connection requests or another form of ingress into your network.
Expand on your use case. Why/what do want to access on your local network when you are not there?
Hmm interesting to learn, thank you for sharing. I still contend that it shouldn’t be coward going to coward. It should be a verb for the last word as it is in Haters going to Hate. I am not familiar with coward being used as a verb.
Alex Lace according to a reverse image search. No real idea who he is.
The verb form is cower. Apparently not.
I think it is defined as they are protected in travel to, from, and while sitting in formal sessions, not official duties.
Snippet from the constitution.
They shall in all Cases, except Treason, Felony and Breach of the Peace, be privileged from Arrest during their Attendance at the Session of their respective Houses, and in going to and returning from the same; and for any Speech or Debate in either House, they shall not be questioned in any other Place.
Thank you for an informative and insightful comment.
Five bucks says he was told to wait for a budget to be provided from the DOGE.
Why would you setup a deployment server on a non-trusted network?
The headlines leave out the part where this is a requirement of their security clearance. It is not uncommon for those holding a security clearance to be discouraged or prohibited from relationships with foreign nationals. It also isn’t a direct prohibition, it would just result in a loss of their clearance, and you are absolutely correct that this will result in more leverage against US personnel.
It’s ok, because it says congress shall make no law. /s
Pass out red cards to inform individuals. https://www.ilrc.org/red-cards-tarjetas-rojas
I don’t think that is a fair argument in this day and age of software development, especially for an operating system. With that level of complexity, I would contend that it is next to impossible to identify potential failure scenarios. I also think this suffers from a rose colored glasses view on history. Perhaps software in the past was as vulnerable, it just never got patched because there wasn’t an easy method to apply updates. Now that there is, it is much better to have a responsive development team to react and fix obscure problems that are difficult or impossible to predict.
This article has no useful information.
I’m guessing CF stands for cluster fuck.
Firefox, notepad ++, PuTTy
It isn’t always that they don’t know what they want, sometimes they just don’t know how to describe what they want, or they may know what they don’t want.
A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.