Twingate Community Hub
Build, connect, and learn with the Twingate Community
Welcome to your hub for all things Twingate Community. Explore community-built projects, connect with other 'Gaters, and share what you're working on. From homelabs to enterprises, we're building a more secure way to connect.
New to Twingate?
Explore open-source projects
Build faster with tools and projects built by our team and the Twingate Community.
Upcoming Community Events
Check back soon!
Live Event
Nov 10
Join Digital Ocean & Twingate for an exclusive Happy Hour for top Engineering, IT, and Security leaders during KubeCon 2025.
Just getting started with Twingate? We've got you covered.
Join a live onboarding session hosted by the Twingate team to learn tips, tricks, and best practices for deploying Twingate.
Just getting started with Twingate? We've got you covered.
Join a live onboarding session hosted by the Twingate team to learn tips, tricks, and best practices for deploying Twingate.
Just getting started with Twingate? We've got you covered.
Join a live onboarding session hosted by the Twingate team to learn tips, tricks, and best practices for deploying Twingate.
Join the conversation
We love hearing from the Twingate Community. Let us know what you like, what you don't, and what you want to see next from the team.
Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.
The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.
All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.
Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.
You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.
Don't typically vouch for many security products, but Twingate is one that I do.
Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.
openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)
A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now
Twingate is the future of VPN!!
Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.
The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.
All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.
Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.
You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

Vishal K C
Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |
to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,
I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .
I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.
Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.
Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.
Hopefully I'll like it better than Teleport.
#twingate #teleport #networkchuck #cybersecurity
Don't typically vouch for many security products, but Twingate is one that I do.
Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.
openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)
A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now
Twingate is the future of VPN!!

Vishal K C
Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |
to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,
I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .
I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.
Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.
Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.
Hopefully I'll like it better than Teleport.
#twingate #teleport #networkchuck #cybersecurity
Solutions
Solutions
Solutions
















