<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: PLG88</title><link>https://news.ycombinator.com/user?id=PLG88</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 09:31:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=PLG88" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by PLG88 in "Noq: n0's new QUIC implementation in Rust"]]></title><description><![CDATA[
<p>Glad it helped (I work on the project). Reading up on Iroh, OpenZiti approaches this less as ‘how do I reach that host across any path’ and more as ‘which identity is allowed to access which service across paths’,’ which feels like a better fit for app-specific access based on zero trust principles than a general network relay.</p>
]]></description><pubDate>Fri, 20 Mar 2026 10:01:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47452532</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=47452532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47452532</guid></item><item><title><![CDATA[New comment by PLG88 in "Noq: n0's new QUIC implementation in Rust"]]></title><description><![CDATA[
<p>Good pointer. OpenZiti does fit that model well — app-embedded rather than network-wide relay/VPN first (though OpenZiti also supports non-embedded options). The main difference is it’s not just connectivity in the app, but identity- and policy-driven service access, so you get authN/Z-before-connect, with explicit Zero Trust principles, rather than just a tunnel embedded in the client/server.</p>
]]></description><pubDate>Fri, 20 Mar 2026 10:00:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47452518</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=47452518</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47452518</guid></item><item><title><![CDATA[New comment by PLG88 in "Tailscale Peer Relays is now generally available"]]></title><description><![CDATA[
<p>Embedding is an option, but tunnelers - <a href="https://netfoundry.io/docs/openziti/reference/tunnelers/" rel="nofollow">https://netfoundry.io/docs/openziti/reference/tunnelers/</a> - and edge routers (which can front legacy services without modifying them) also exist.<p>The difference is architectural; Tailscale is a mesh VPN, whereas OpenZiti is an identity-first, zero trust overlay network. This makes OpenZiti service-centric and deny-by-default, not network-centric. Instead of “join a private network,” you get access only to explicitly authorised services — with no ambient reachability at all. Its also 100% open source. If you want a simple productised, SaaS experience, NetFoundry, the company behind OpenZiti provides that.</p>
]]></description><pubDate>Thu, 19 Feb 2026 08:38:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47071414</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=47071414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47071414</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>That’s a fair framing, with one important distinction.<p>Overlay ACLs give you network-scoped microsegmentation, not service-scoped Zero Trust (as intended in NIST 800-207). You’re limiting which IPs/ports can talk after a node is attached, not deciding whether a service path exists at all per identity and per session.<p>The crypto isn’t the issue - WireGuard keys are strong. The issue is scope. A node identity that grants network reachability is different from a capability-scoped identity that creates only explicit service connectivity. NIST also warns that IP-based enforcement tends to reintroduce ambient trust once a device is attached. In that model, lateral movement is reduced, not eliminated.<p>A simple litmus test:
- If authenticating gives you an IP and routes, you’ve built network trust with segmentation.
- If authenticating only creates explicit service paths, you’ve built Zero Trust.<p>Mapping this to Wireguard and overlays, I’d say:
- WireGuard + identity + ACLs = good overlay microsegmentation
- Identity-first connectivity (no IP reachability, no inbound listeners) = Zero Trust by construction<p>If you adopt the latter, the former becomes unnecessary for Zero Trust — because identity creates connectivity directly instead of attaching nodes to a network. Bringing it back to the topic, microsegmentation manages risk inside a network. Identity-first connectivity removes the network from the trust model altogether.</p>
]]></description><pubDate>Mon, 02 Feb 2026 09:24:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46854018</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46854018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46854018</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Right, but if certificates are a fundamental part of your design, you should include the functional mechanisms to manage them imho (i.e., key distribution, auth/login). The developers created it, but they keep it in the commercial product. Other overlays which use PKI include those functions in the FOSS.</p>
]]></description><pubDate>Mon, 02 Feb 2026 09:12:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46853955</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46853955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46853955</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>nah, I dont buy that. A network is not a functional requirement of SSH etc in your use case.</p>
]]></description><pubDate>Sun, 01 Feb 2026 22:34:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46850108</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46850108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46850108</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Fair, I was being loose with my language. What I should have said is that it does not come fully featured open source, that you need to do a certain amount of rolling your own.</p>
]]></description><pubDate>Sun, 01 Feb 2026 20:52:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46849268</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46849268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46849268</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Referring to the previous person's comment, that you need to manage a PKI and have to distribute the keys yourself, no auth/login etc.</p>
]]></description><pubDate>Sun, 01 Feb 2026 19:20:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46848554</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46848554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46848554</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Yeah, definitely more on the commercial side of the product.<p>And agreed, I like NetBird/Tailscale/Wireguard, but they are better VPNs, not identity-first, zero trust overlays as OpenZiti/NetFoundry is. That's why companies like Siemens have adopted it and many more will.</p>
]]></description><pubDate>Sun, 01 Feb 2026 17:09:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46847577</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46847577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46847577</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Ahh, I see, thanks for clarifying. That was correct, now any OIDC-compatible identity provider (Auth0, Okta, Azure/Microsoft Entra, Google, Keycloak, etc.) is supported on all the tunnelers to my knowledge.<p>Lots of work continues to go into the UX, but I would note that we focus most of the UI/UX work into NetFoundry, our commercial product.</p>
]]></description><pubDate>Sun, 01 Feb 2026 16:53:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46847461</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46847461</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46847461</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>How are the mobile and desktop clients incomplete?? Tunnelers exist for Windows, Android, iOS, Linux, MacOS, and more - <a href="https://netfoundry.io/docs/openziti/reference/tunnelers/" rel="nofollow">https://netfoundry.io/docs/openziti/reference/tunnelers/</a>....</p>
]]></description><pubDate>Sun, 01 Feb 2026 16:12:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46847155</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46847155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46847155</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Short answer: no, authenticating to start a VPN doesn’t make it Zero Trust.<p>Once you authenticate to a VPN, you’re granted network attachment. From that point on, the network is effectively saying “I trust you enough to route packets,” and enforcement shifts to IPs, subnets, and firewall rules. That’s still network-level trust, even if the login was strong.<p>Zero Trust (architecturally; check out NIST 800-207) changes what identity does:<p>- Identity doesn’t just gate entry
- Identity + policy decide whether a path exists at all, per service, per session
- If you’re not authorized for a service, there is literally no route, IP, or port to talk to<p>On your last point: it’s not “only application-layer,” but it’s also not traditional L3/4 networking. It’s an overlay where identity is bound into connection establishment itself (mTLS/E2EE, service addressing, no inbound listeners), so the network never becomes a trust plane in the first place.<p>That’s the difference between “authenticate, then connect to a network” and “authenticate to create connectivity.”<p>For a reference, check out OpenZiti, thats a project I work on - <a href="https://openziti.io/" rel="nofollow">https://openziti.io/</a></p>
]]></description><pubDate>Sun, 01 Feb 2026 16:05:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46847096</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46847096</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46847096</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>You could use a solution that allows you to have E2E with private sovereign keys on the endpoint, as well as bring your own IdP/PKI, so the provider does not have your keys. Would that be good enough?</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:46:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846964</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846964</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846964</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Out of curiosity, why? Because you dont want to run software on users devices?</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:43:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846942</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846942</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Its more a sharing (outbound proxy) solution than a VPN like Netbird is.</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:40:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846915</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846915</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846915</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Check out OpenZiti. Its open source, runs at prodution scale, and recently someone who used to work at Twingate said OpenZiti is many times more powerful than TG.</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:39:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846904</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846904</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846904</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>This problem has been brought up in the OpenZiti community many times. I like Nebula, but it's not 'truly open source'.</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:38:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846897</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846897</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>I like Netbird, its a better VPN, but its not zero trust networking. Zero Trust requires identity to create connectivity itself—per service, per session—rather than granting network reachability and constraining it with routes and rules. I have had this conversation on Reddit many times... curious if anyone agrees/disagrees.</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:36:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846891</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846891</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846891</guid></item><item><title><![CDATA[New comment by PLG88 in "Netbird – Open Source Zero Trust Networking"]]></title><description><![CDATA[
<p>Why do you think thats against the principles of zero trust? Wireguard is a wire transport, it has no control plane... I think what you are alluding to is the centralised control plane which makes it possible to operate at scale (and much more).</p>
]]></description><pubDate>Sun, 01 Feb 2026 15:30:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46846834</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46846834</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46846834</guid></item><item><title><![CDATA[New comment by PLG88 in "CLI agents make self-hosting on a home server easier and fun"]]></title><description><![CDATA[
<p>You have more or less described OpenZiti. Just mint a new identity/JWT for the user, create a service, and viola, only that user has access to your machine. Fully open source and self-hostable.</p>
]]></description><pubDate>Mon, 12 Jan 2026 09:27:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46586064</link><dc:creator>PLG88</dc:creator><comments>https://news.ycombinator.com/item?id=46586064</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46586064</guid></item></channel></rss>