Locking down ZeroTier peer-to-peer networks
In this long overdue post, we'll share a few tricks that we use to heavily secure our own ZeroTier networks to not only restrict communication to authorized hosts on a directional basis but even capture and inspect packets!…