This is a story about how I lost my data when trying to prevent it by backing it up.
After my initial post about obfs4 on how to hide any TCP traffic and an example for hiding SSH traffic, it's now time to do so for OpenVPN...
In this post I'm going to give you a real example of obfs4proxy being used to obfuscate SSH traffic.
In this post, I'm going to give you the information necessary to be able to use obfs4 protocol not just for wrapping Tor traffic, but for virtually any other TCP traffic as well.
Much has been changed since my last post about LUKS remote unlock workaround. This is the updated version on how to set things up properly.
Compatibility issues arises when using OpenDKIM/OpenDMARC Unix sockets with chrooted Postfix installation. In this post you will learn to resolve this...
Not so long ago, remote unlocking of a LUKS-encrypted root partition was difficult to setup. While essential for headless servers, all required steps needed to be done manually and compatibility was a concern. Luckily, it is much simpler to do so in recent versions of Ubuntu/Debian. Unlocking an encrypted root remotely *should* be as simple as installing a single package... We'll see about that in a moment.