<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vpn on Besterry — Linux &amp; DevOps Notes</title><link>https://besterry.com/tags/vpn/</link><description>Recent content in Vpn on Besterry — Linux &amp; DevOps Notes</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 15 Apr 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://besterry.com/tags/vpn/index.xml" rel="self" type="application/rss+xml"/><item><title>WireGuard vs AmneziaWG: When Obfuscation Matters</title><link>https://besterry.com/posts/wireguard-vs-amneziawg/</link><pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate><guid>https://besterry.com/posts/wireguard-vs-amneziawg/</guid><description>&lt;p&gt;Plain WireGuard is simple and fast. AmneziaWG adds obfuscation to the handshake. When do you need which?&lt;/p&gt;
&lt;h2 id="plain-wireguard-is-enough-when"&gt;Plain WireGuard is enough when&lt;/h2&gt;
&lt;p&gt;You control both endpoints, no DPI is filtering your traffic, and the main concern is performance and simplicity. WireGuard shines for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Site-to-site VPN between your own servers&lt;/li&gt;
&lt;li&gt;Remote access to a home lab&lt;/li&gt;
&lt;li&gt;Point-to-point tunnels on a LAN&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The handshake is small, fast, and provably secure. It uses Noise framework primitives and 1 RTT.&lt;/p&gt;</description></item></channel></rss>