This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.

henfredemars@lemmy.world

Personal website:

https://henfred.me/

  • 6 Posts
  • 696 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle
  • There’s a really important reason for this! Wireguard is connectionless. The reconnection process is as simple as sending the next packet of data normally because the server will accept valid packets from anywhere. You don’t have to do some fancy re-handshake and re-authentication process every time you lose access momentarily.

    This is perfect for a device like a smartphone that might suspend network access to save battery and switch between different networks on a regular basis. The software basically does nothing in these common cases. The server couldn’t care less where the packets are coming from so long as the crypto checks out. If the device wishes to sleep, just stop sending packets. There isn’t a connection to be broken.

    Now, consider that the crypto can be handled in the kernel because the code is extremely simple and easy to maintain, which further reduces the power requirements through reducing the need to switch between privileged and unprivileged modes. The cryptography itself was designed to be easy to execute on a device where power consumption is a concern. Even if you don’t have hardware support for the operations, it executes very well on all virtually all processors.

    Wireguard is an engineering marvel. It is simple, yet robust. It is good design.













  • henfredemars@infosec.pubtoLinux@lemmy.mlLinux for iPod?
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    4 days ago

    Not just that — Even if you exploited some bug to run unsigned code, it’s highly unlikely you could find all the drivers needed for that hardware. There’s not a lot of motivation from the open source community to support a tightly controlled platform where few users could even attempt to run it.









  • henfredemars@infosec.pubtomemes@lemmy.worldLooking at you Verizon
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    7 days ago

    They care because some users don’t actually own their phones and the carrier wants to keep strings attached, or they want to impose artificial software restrictions like preventing or limiting hotspot data.

    Even when none of those conditions apply, you still often must deal with the locked boot loader. It’s BS.