You still have the other one
đź”” This profile hasn't been claimed yet. If this is your Nostr profile, you can claim it.
Edit
You still have the other one
🤣
would someone mind zapping me like 1 sat? I want to test new channel
See you at $10k
Excellent. Probably best not to. What ended up being the issue?
lol ok then troubleshooting Make sure we are looking at the right interface. Run ip route and see if it’s eth or usb instead. Check the client config allowed IPs AllowedIPs = 0.0.0.0/0 Silly but make sure the client has internet access in the first place curl https://1.1.1.1 iptables are easy to make a mess with. Run and see if there is a rule conflict sudo iptables -P FORWARD ACCEPT
Add the subnet and forwarding rules sudo iptables -t nat -A POSTROUTING -s 10.6.0.0/24 -o enp0s10 -j MASQUERADE sudo iptables -A FORWARD -i wg0 -o enp0s10 -j ACCEPT sudo iptables -A FORWARD -i enp0s10 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT If it works add it to your WireGuard rules so it stays persistent
Sounds like traffic is not being NATed or routed out of the Pi, so clients can talk to the LAN but not the internet. Check by running in terminal: sudo sysctl net.ipv4.ip_forward If it returns 0 then thats your problem. If so edit sysctl.conf and add: net.ipv4.ip_forward=1 Then enable: sudo sysctl -p If that's not it then it is something in your iptables or allowed IPs on your client.
I am having an episode. I thought I was past this but here we are.
I am not doing ok.
Nah, just passive scanning to see my environment
How would they know if you had nostr keys? They wouldn’t. https://www.cnn.com/2026/01/28/travel/social-media-esta-proposal-world-travel
Agree but curious why you think so.
Your router is the most important privacy device you own. Not your phone. Not your laptop. It’s the box that decides where your traffic goes. https://untraceabledigitaldissident.com/check-router-vpn-dns-leaks
Operational privacy for real people.