It takes a lot to admit you're wrong
But that's what I'm doing today. (v-2-1-1 release)
It can be painful to admit you’re wrong. And even harder to change, especially if that involves lost money. But that is exactly what I’m doing today.
Structural Changes
We’re making a huge fundamental technical change to HydraVeil’s systemwide Wireguard.
The new system has faster initial connections, less friction in failed attempts, and doesn’t require the previous sudo exemption policies. But it does mean abandoning our previous systemwide work. Which means I lost some money.
It’s not easy to let time and money go, but I have a moral obligation to do what’s best for the end-user (you). And not for my pride or wallet.

2.1.1
Starting today with the release of HydraVeil v2.1.1, all systemwide HydraVeil connections will be using Linux’s Network Manager and nmcli. And will no longer be using wg-quick.

We are using nmcli (a Linux command line tool) in its original and highest level form, which means fully relying on nmcli to securely parse Wireguard configuration files. This allows Simplified Privacy to stand on the shoulders of the Linux developers, and focus on our unique features for the layer 2.
Sudo Systemwide
This also means users who previously enabled the “sudo systemwide policies” can undo that.
As the new nmcli system does not require those policies to achieve the same effect. The options menu will now clearly allow you to disable this in the “legacy” section.

IPv6 Leaks
Additionally, this 2.1.1 release sees increased protection against IPv6 leaks, in a way that does NOT require disabling IPv6 to avoid the leak. Please make sure to fully test this against an IPv6 IP address website to ensure it is working, after re-enabling IPv6 if you did so during the earlier beta stages. But this is an experimental new feature, and you must test that it works against an IP checker website with IPv6.
Download link:
https://api.hydraveil.net/downloads/linux-x86_64/clients/v2.1.1/appimage/hydra-veil-x86_64.AppImage
Verify
If you wish to verify it, you may run this command:
sha256sum [filename]
It should spit out this for 2.1.1:
307c15acb4e27aaa76aec6f4b84f43bd758633e469a60f6608801b74e93c04c2
Arweave
We use Arweave, because it’s an immutable tamper-proof communication method, with the Arweave domain name “pgp_privacy”. This can be accessed from any gateway as a subdomain:
Germany: https://pgp_privacy.arweave.fllstck.dev/
New Jersey: pgp_privacy.vilenarios.com
China: https://pgp_privacy.ar.owlstake.com
Official: https://pgp_privacy.arweave.net/
Gitlab with changes:
Tutorials / Help:
If you really want to learn and take your privacy to the next level, Learn about HydraVeil, Access our VPN, and subscribe to our new content via: Arweave Video RSS, Podcast RSS, Session list, Nostr, Bastyon, Article RSS, or join the Signal Group
Related Posts
First Community Node: Chile with CypherPink
v2.0.2 Release! First South America Location.
[SP]
Jan 3, 2026
Why a Nostr VPN?!
How should node operators identify themselves?
[SP]
Dec 17, 2025
Release Notes: HydraVeil v2
Nostr Operators, No-Sudo Systemwide, & More.
[SP]
Dec 17, 2025
The Myth of Spoofing (Video)
Why Spoofing User-Agents is Usually a Bad Idea
[SP]
Nov 15, 2025