upvote
Here is an implementation you might like

https://github.com/artpar/terminal-tunnel

P2P with webrtc (pion ftw) with e2ee

client side is webui so you can use on any device

ps: the default Cloudflare Worker from my account is already maxed out so you will need your own exchange (self host on your account)

reply
Looking at their website it seems they're trying to target a slightly less tech savvy audience which are interested in checking on agents while away. Someone willing to blow cash on overpriced AI subscriptions, I could see justifying blowing money on this.
reply
Reticulum shell is also an option, and would also work over LoRa

https://pypi.org/project/rnsh/

reply
Especially for a tool that only work on macOS and iPhone, and only serves one purpose.

Pretty much every developer out there has some kind of tooling that does this already, that also does more.

This is a cool little project, but I cannot imagine paying for it.

reply
[dead]
reply
> "pure HTTPS port 443 -- you literally can't block it without breaking the web."

Sure you can, you do Man In The Middle certificate inspection and then filter it aggressively like it was HTTP; that's the product companies like ZScaler offer, and basically any business/enterprise firewall device - internet filtering to protect your company and prevent or detect data exfiltration and malicious activity. Or perhaps you could say that does 'break the web' but companies do it anyway and pay a lot of money so they can do it. (ZScaler is a $23Bn market cap company).

reply
Honestly, at that point I'd just run SSH over WebSockets with websocat. WebRTC only adds extra complexity. Tailscale DERP relay servers also run over port 80/443 anyway.
reply
In the company where my father works some HTTPS services are blocked too…
reply