wireguard – yet another open source vpn
WireGuard securely encapsulates IP packets over UDP. You add a WireGuard interface, configure it with your private key and your peers’ public keys, and then you send packets across it. All issues of key distribution and pushed configurations are out of scope of WireGuard; these are issues much better left for other layers, lest we end up with the bloat of IKE or OpenVPN. In contrast, it more mimics the model of SSH and Mosh; both parties have each other’s public keys, and then they’re simply able to begin exchanging packets through the interface.
YOU can help rewire the internet so it’s faster, safer and more accessible for all by using TAILS and MYSTERIUM
Run TAILS BETA
Run a MYSTERIUM ALPHA BLOCKCHAIN VPN node
wow @snyk now automatically creates branches and PRs to fix your @github projects
just connect your @github account to @snyk and they will automatically create PRs to remove vulnerabilities in your code !
node electron apps on github
# npm install -g electron
# npm install -g electron-packager
$ NODE_PATH=/usr/local/lib/node_modules make release
an easy to search vulnerability db with detailed information and remediation guidance from @snyksec
example search for zip vulnerabilities
Software Composition Analysis (SCA) apps from @synksec and @whitesourcesoftware
If you want to detect vulnerable dependencies in your GitHub project with snyk you will need to make sure your project has a manifest file so snyk can decide what frameworks you are including.
To get proper test results and create Snyk projects, at least one of the relevant manifest files must be present in the tested folder (CLI), repository (SCM) or app (serverless).
You get a great report showing you issues in your projects
You can also connect Snyk to BitBucket, Docker and GitLab