This seems to good to be true.
Try it out. And tell us if it’s working.
Read the comments on the YouTube page. This is not secure at all.
I may be being a bit unfair, but people who look and sound like this are massive red flags for me. Too much hype, too much clueless.
Well, i can’t debate that. But a very important point. However main thing now is to verify if it’s working with Roon.
There are also competitors to this solution.
Twingate is also a VPN, like Tailscale and Zerotier, see
I think this is misleading without substantiating. The biggest gripe, it would seem, is that for a zero knowledge solution, trust is given entirely to a third party. But then, how many people use Dropbox or other service providers for hosting their data?
As already stated, there are alternative solutions, and some may be self-hosted.
It seems to me that there is a big difference between someone gaining access to your cloud files and someone gaining access to your entire network.
It’s your data, so it doesn’t matter where it is if someone gains unauthorized access. Nonetheless, you haven’t explained what you mean by “… is not secure at all.”
If you guys like to discuss cybersecurity and VPN, create a thread and have fun.
As many like to have full Roon access all over, and not just using Arc, I hope this solution will work. Looking forward to hear from someone who already tried.
At the moment I’m using Wireshark with OpenWRT on IOS. That’s enough for me. I also used IpFire and IPsec. Which was fine.
If someone states that the product you posted a link to “is not secure at all”, I’d say that this is on-topic, especially since you haven’t used it.
Me too!
Tailscale works according to my experience, others have posted that Zerotier works as well, so that it is very likely that the same can be done with Twingate. Just give it a try if you are interested.
I have not used TwinGate, but in general ZeroTrust solutions are a much better, more secure option than a VPN. This is another alternative that is also a free to use ZeroTrust solution. https://netfoundry.io/ CloudZiti has a free plan and OpenZiti requires you host the infrastructure, but is free forever with unlimited data transfer.
Short version - VPNs typically get you on a network, and you likely have more access than you need on the other side which is a huge risk. Also, VPNs have open ports on the internet which are actively targeted and compromised.
True ZeroTrust solutions like CloudZiti/NetFoundry only allow highly limited encrypted access to a cryptographic identity. Basically you install and agent on both sides, it connects outbound only on both sides to an overlay network, where Roon endpoint can talk to Roon Core over an encrypted tunnel and nothing else is even available. You not only specify the ports and protocols, but also the host. Basically, nothing is available until you explicitly grant it.
I am building a vacation home and this is how I will connect back to my main him where the Core will reside. Much more secure than any VPN, and no open ports on your routers firewall. Also, really easy to setup a Plex server, or anything else you might want to access when away from home.
Dammit, 2am and now I want some coffee.
How would you load that onto Rock on a Nuc? I’d give it a go…
That is impossible. I think won’t be supported ever. You need to use something else. We may hope for Sonictransporter to support it if it’s a success. Best option is to use a NAS. For testing almost anything I guess.
Whatever. You keep your most important stuff in the cloud if you want to. I won’t.
Dropbox isn’t a backup solution, it’s a file-transfer/sharing solution.
Yeah, this. Saying “don’t use a VPN, use Twingate” is like saying “don’t drive a car, drive a Honda,” which makes NetworkChuck sound, well, kind of ignorant. Twingate–like Tailscale and Zerotier–relies on a third party to set up the connection, which is questionable in terms of security, but also allows you to connect when, say, your home Internet connection is behind CGNAT, which would prevent you from setting up your own VPN server.
Furthermore, his “(traditional) VPN is insecure” arguments are also pretty weak, given that all the segmentation he needs can be done with other, more-traditional VPN arrangements as well.
…unless you configure your VPN server non-foolishly, in which case it gets users only the access that is desired. This isn’t rocket surgery. But admittedly it does take a little more thought than checking the box to enable the OpenVPN server in your router.
Targeted, yes, though it’s easy enough to listen on a non-standard port if you think that will help. Compromised? I’m not aware of any compromises of the OpenVPN protocol, or that server software, nor of the protocol or server for Wireguard–nor does a Google search find any. Now, of course, if you configure your VPN server stupidly–password-only authentication with an insecure password, for example–that’s on you.
VPN is safer than nothing for sure and in general a good solution.
That being said the Federal Government has banned using VPNs and mandated a Zero Trust architecture for accessing applications.
Search on VPN once you are on the above link.
There have been many vulnerabilities with OpenVPN software, as there is with most software.
I am not vouching for TwinGate but in general, the world is moving towards Zero Trust because of least privileged access by default and identity based access. Unfortunately Zero Trust has become a marketing buzzword but it is a journey the security world is moving towards.
There’s a lot that could be said about that link, but for the sake of brevity:
I said “compromise”, not “vulnerability,” though I admittedly didn’t define that term carefully. I mostly had in mind allowing an attacker to bypass authentication and access the network, though remote code execution would also qualify.
Not to mention quite the misnomer, because there’s a whole lot of trust–in protocols, in code, and in actors–still going on.
But when it comes to the subject of this topic–accessing your Roon instance remotely–there are three basic ways to do it:
There’s no such thing as perfect security; everything’s a series of tradeoffs. But the decisions should be made on the basis of the relevant facts.