logoalt Hacker News

ronsortoday at 7:24 PM5 repliesview on HN

The pricing is extremely steep for a tech-savvy audience that could just set up Tailscale or MOSH.


Replies

artpartoday at 8:31 PM

Here is an implementation you might like

https://github.com/artpar/terminal-tunnel

P2P with webrtc (pion ftw) with e2ee

client side is webui so you can use on any device

ps: the default Cloudflare Worker from my account is already maxed out so you will need your own exchange (self host on your account)

foxmosstoday at 8:49 PM

Looking at their website it seems they're trying to target a slightly less tech savvy audience which are interested in checking on agents while away. Someone willing to blow cash on overpriced AI subscriptions, I could see justifying blowing money on this.

snowhaletoday at 8:31 PM

yeah Tailscale + mosh is the obvious answer for most people. but WebRTC has one specific win: corporate networks that block all VPN/UDP traffic. mosh needs UDP, Tailscale needs its relay port at minimum. WebRTC's TURN fallback is pure HTTPS port 443 -- you literally can't block it without breaking the web. so if your target user is 'I need to SSH into my Mac from a locked-down enterprise wifi', WebRTC is actually the right call.

show 3 replies
bergietoday at 9:17 PM

Reticulum shell is also an option, and would also work over LoRa

https://pypi.org/project/rnsh/

RIMRtoday at 8:19 PM

Especially for a tool that only work on macOS and iPhone, and only serves one purpose.

Pretty much every developer out there has some kind of tooling that does this already, that also does more.

This is a cool little project, but I cannot imagine paying for it.