diff --git a/lib/default.nix b/lib/default.nix
index 23cf85cd..46a68498 100644
--- a/lib/default.nix
+++ b/lib/default.nix
@@ -19,14 +19,15 @@
   # Helper function for generating home-manager configs
   mkHome = { 
     hostname, 
-    username ? "albert",
-    desktop  ? null, 
-    system   ? "x86_64-linux", 
-    theme    ? "default",
-    type     ? "default",
+    username        ? "albert",
+    desktop         ? null, 
+    system          ? "x86_64-linux", 
+    theme           ? "default",
+    type            ? "default",
+    deployment_type ? "hosts",
   }: inputs.home-manager.lib.homeManagerConfiguration {
     pkgs = inputs.nixpkgs.legacyPackages.${system};
-    extraSpecialArgs = { inherit inputs outputs desktop hostname system username theme; };
+    extraSpecialArgs = { inherit inputs outputs desktop hostname system username theme deployment_type; };
     modules = [ ../home-manager/${type}.nix ];
   };
 
diff --git a/nixos/hosts/frankfurt-linode-01/default.nix b/nixos/hosts/frankfurt-linode-01/default.nix
index 1b55784f..6dbb5ab7 100644
--- a/nixos/hosts/frankfurt-linode-01/default.nix
+++ b/nixos/hosts/frankfurt-linode-01/default.nix
@@ -1,12 +1,11 @@
 { lib, modulesPath, hostname, ... }: {
   imports = [ 
     (modulesPath + "/profiles/qemu-guest.nix")
-    ../../common/services/tailscale-autoconnect.nix
-    # ./firewall.nix
-    ../osaka-linode-01/firewall.nix
-    ./wireguard.nix
-    ../../common/services/docker.nix
     (import ../../common/containers/derp.nix { domainName = "frankfurt.sysctl.io"; })
+    ../../common/services/tailscale-autoconnect.nix
+    ../../common/services/docker.nix
+    ./firewall.nix
+    ./wireguard.nix
   ];
 
   boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" "sd_mod" ];
@@ -27,9 +26,9 @@
   boot.loader.timeout = 10;
 
   fileSystems."/" = { 
-      device = "/dev/disk/by-label/nixos";
-      fsType = "ext4";
-    };
+    device = "/dev/disk/by-label/nixos";
+    fsType = "ext4";
+  };
 
   swapDevices = [ { device = "/dev/disk/by-label/linode-swap"; } ];
   
diff --git a/nixos/hosts/frankfurt-linode-01/firewall.nix b/nixos/hosts/frankfurt-linode-01/firewall.nix
index e204081c..c27416bb 100644
--- a/nixos/hosts/frankfurt-linode-01/firewall.nix
+++ b/nixos/hosts/frankfurt-linode-01/firewall.nix
@@ -51,8 +51,8 @@
   };
 
   environment.systemPackages = [ pkgs.cacert ];
-  
-   services.haproxy = {
+
+  services.haproxy = {
     enable = true;
     config = ''
       defaults
@@ -65,7 +65,10 @@
       frontend http
         mode http
         bind :80
-        bind :443 ssl crt /Storage/Data/Docker/sysctl.io/letsencrypt/external/*.sysctl.io/combined.pem
+        # bind :443 ssl crt /Storage/Data/Docker/sysctl.io/letsencrypt/external/*.sysctl.io/combined.pem
+        
+        acl is-blocked-ip src -f /etc/haproxy-blocked-ips
+        http-request deny if is-blocked-ip
 
         http-request redirect scheme https unless { ssl_fc }
         default_backend backend_http
@@ -73,24 +76,22 @@
         mode http
         option forwardfor
         option forwarded
-        server warsaw-ovh-01 10.100.0.2:443 ssl verify required ca-file ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt sni req.hdr(Host)
-
-      frontend vintage-story
-        mode tcp 
-        bind :42420
-        default_backend backend_tcp 
-      backend backend_tcp
-        mode tcp
-        server vintage-story-wg 10.100.1.5
-
+        # server framework-server 10.100.0.2:443 ssl verify required ca-file ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt sni req.hdr(Host)
+        server framework-server 10.100.0.2 
+        
       frontend tcp
         mode tcp
         bind :25565 
         bind :4443  
+        bind :443  
+        
+        acl is-blocked-ip src -f /etc/haproxy-blocked-ips
+        http-request deny if is-blocked-ip
+
         default_backend backend_tcp 
       backend backend_tcp
         mode tcp
-        server warsaw-ovh-01 10.100.0.2
+        server framework-server 10.100.0.2
 
       frontend mail 
         mode tcp
@@ -104,6 +105,272 @@
       backend backend_mail
         mode tcp 
         server mailserver-wg 10.100.1.3
+
+      frontend vintage-story
+        mode tcp 
+        bind :42420
+        default_backend backend_vintage-story 
+      backend backend_vintage-story
+        mode tcp
+        server vintage-story-wg 10.100.1.5
     '';
   };
+
+  environment.etc."haproxy-blocked-ips".text = ''
+    # https://openai.com/searchbot.json
+    20.42.10.176/28
+    172.203.190.128/28
+    51.8.102.0/24
+
+    # https://openai.com/chatgpt-user.json
+    # 23.98.142.176/28 
+    # 40.84.180.224/28 
+    # 13.65.240.240/28 
+    # 20.97.189.96/28 
+    # 20.161.75.208/28 
+    # 52.225.75.208/28 
+    # 52.156.77.144/28 
+    # 40.84.221.208/28 
+    # 40.84.221.224/28 
+    # 40.84.180.64/28 
+    # 23.98.179.16/28 
+
+    # https://openai.com/gptbot.json
+    # 52.230.152.0/24 
+    # 52.233.106.0/24 
+    # 20.171.206.0/24 
+
+    # https://developers.google.com/search/apis/ipranges/googlebot.json
+    2001:4860:4801:10::/64
+    2001:4860:4801:11::/64
+    2001:4860:4801:12::/64
+    2001:4860:4801:13::/64
+    2001:4860:4801:14::/64
+    2001:4860:4801:15::/64
+    2001:4860:4801:16::/64
+    2001:4860:4801:17::/64
+    2001:4860:4801:18::/64
+    2001:4860:4801:19::/64
+    2001:4860:4801:1a::/64
+    2001:4860:4801:1b::/64
+    2001:4860:4801:1c::/64
+    2001:4860:4801:1d::/64
+    2001:4860:4801:1e::/64
+    2001:4860:4801:1f::/64
+    2001:4860:4801:20::/64
+    2001:4860:4801:21::/64
+    2001:4860:4801:22::/64
+    2001:4860:4801:23::/64
+    2001:4860:4801:24::/64
+    2001:4860:4801:25::/64
+    2001:4860:4801:26::/64
+    2001:4860:4801:27::/64
+    2001:4860:4801:28::/64
+    2001:4860:4801:29::/64
+    2001:4860:4801:2::/64
+    2001:4860:4801:2a::/64
+    2001:4860:4801:2b::/64
+    2001:4860:4801:2c::/64
+    2001:4860:4801:2d::/64
+    2001:4860:4801:2e::/64
+    2001:4860:4801:2f::/64
+    2001:4860:4801:31::/64
+    2001:4860:4801:32::/64
+    2001:4860:4801:33::/64
+    2001:4860:4801:34::/64
+    2001:4860:4801:35::/64
+    2001:4860:4801:36::/64
+    2001:4860:4801:37::/64
+    2001:4860:4801:38::/64
+    2001:4860:4801:39::/64
+    2001:4860:4801:3a::/64
+    2001:4860:4801:3b::/64
+    2001:4860:4801:3c::/64
+    2001:4860:4801:3d::/64
+    2001:4860:4801:3e::/64
+    2001:4860:4801:40::/64
+    2001:4860:4801:41::/64
+    2001:4860:4801:42::/64
+    2001:4860:4801:43::/64
+    2001:4860:4801:44::/64
+    2001:4860:4801:45::/64
+    2001:4860:4801:46::/64
+    2001:4860:4801:47::/64
+    2001:4860:4801:48::/64
+    2001:4860:4801:49::/64
+    2001:4860:4801:4a::/64
+    2001:4860:4801:50::/64
+    2001:4860:4801:51::/64
+    2001:4860:4801:53::/64
+    2001:4860:4801:54::/64
+    2001:4860:4801:55::/64
+    2001:4860:4801:60::/64
+    2001:4860:4801:61::/64
+    2001:4860:4801:62::/64
+    2001:4860:4801:63::/64
+    2001:4860:4801:64::/64
+    2001:4860:4801:65::/64
+    2001:4860:4801:66::/64
+    2001:4860:4801:67::/64
+    2001:4860:4801:68::/64
+    2001:4860:4801:69::/64
+    2001:4860:4801:6a::/64
+    2001:4860:4801:6b::/64
+    2001:4860:4801:6c::/64
+    2001:4860:4801:6d::/64
+    2001:4860:4801:6e::/64
+    2001:4860:4801:6f::/64
+    2001:4860:4801:70::/64
+    2001:4860:4801:71::/64
+    2001:4860:4801:72::/64
+    2001:4860:4801:73::/64
+    2001:4860:4801:74::/64
+    2001:4860:4801:75::/64
+    2001:4860:4801:76::/64
+    2001:4860:4801:77::/64
+    2001:4860:4801:78::/64
+    2001:4860:4801:79::/64
+    2001:4860:4801:80::/64
+    2001:4860:4801:81::/64
+    2001:4860:4801:82::/64
+    2001:4860:4801:83::/64
+    2001:4860:4801:84::/64
+    2001:4860:4801:85::/64
+    2001:4860:4801:86::/64
+    2001:4860:4801:87::/64
+    2001:4860:4801:88::/64
+    2001:4860:4801:90::/64
+    2001:4860:4801:91::/64
+    2001:4860:4801:92::/64
+    2001:4860:4801:93::/64
+    2001:4860:4801:c::/64
+    2001:4860:4801:f::/64
+    192.178.5.0/27
+    192.178.6.0/27
+    34.100.182.96/28
+    34.101.50.144/28
+    34.118.254.0/28
+    34.118.66.0/28
+    34.126.178.96/28
+    34.146.150.144/28
+    34.147.110.144/28
+    34.151.74.144/28
+    34.152.50.64/28
+    34.154.114.144/28
+    34.155.98.32/28
+    34.165.18.176/28
+    34.175.160.64/28
+    34.176.130.16/28
+    34.22.85.0/27
+    34.64.82.64/28
+    34.65.242.112/28
+    34.80.50.80/28
+    34.88.194.0/28
+    34.89.10.80/28
+    34.89.198.80/28
+    34.96.162.48/28
+    35.247.243.240/28
+    66.249.64.0/27
+    66.249.64.128/27
+    66.249.64.160/27
+    66.249.64.224/27
+    66.249.64.32/27
+    66.249.64.64/27
+    66.249.64.96/27
+    66.249.65.0/27
+    66.249.65.160/27
+    66.249.65.192/27
+    66.249.65.224/27
+    66.249.65.32/27
+    66.249.65.64/27
+    66.249.65.96/27
+    66.249.66.0/27
+    66.249.66.160/27
+    66.249.66.192/27
+    66.249.66.32/27
+    66.249.66.64/27
+    66.249.66.96/27
+    66.249.68.0/27
+    66.249.68.32/27
+    66.249.68.64/27
+    66.249.69.0/27
+    66.249.69.128/27
+    66.249.69.160/27
+    66.249.69.192/27
+    66.249.69.224/27
+    66.249.69.32/27
+    66.249.69.64/27
+    66.249.69.96/27
+    66.249.70.0/27
+    66.249.70.128/27
+    66.249.70.160/27
+    66.249.70.192/27
+    66.249.70.224/27
+    66.249.70.32/27
+    66.249.70.64/27
+    66.249.70.96/27
+    66.249.71.0/27
+    66.249.71.128/27
+    66.249.71.160/27
+    66.249.71.192/27
+    66.249.71.224/27
+    66.249.71.32/27
+    66.249.71.64/27
+    66.249.71.96/27
+    66.249.72.0/27
+    66.249.72.128/27
+    66.249.72.160/27
+    66.249.72.192/27
+    66.249.72.224/27
+    66.249.72.32/27
+    66.249.72.64/27
+    66.249.72.96/27
+    66.249.73.0/27
+    66.249.73.128/27
+    66.249.73.160/27
+    66.249.73.192/27
+    66.249.73.224/27
+    66.249.73.32/27
+    66.249.73.64/27
+    66.249.73.96/27
+    66.249.74.0/27
+    66.249.74.128/27
+    66.249.74.32/27
+    66.249.74.64/27
+    66.249.74.96/27
+    66.249.75.0/27
+    66.249.75.128/27
+    66.249.75.160/27
+    66.249.75.192/27
+    66.249.75.224/27
+    66.249.75.32/27
+    66.249.75.64/27
+    66.249.75.96/27
+    66.249.76.0/27
+    66.249.76.128/27
+    66.249.76.160/27
+    66.249.76.192/27
+    66.249.76.224/27
+    66.249.76.32/27
+    66.249.76.64/27
+    66.249.76.96/27
+    66.249.77.0/27
+    66.249.77.128/27
+    66.249.77.160/27
+    66.249.77.192/27
+    66.249.77.224/27
+    66.249.77.32/27
+    66.249.77.64/27
+    66.249.77.96/27
+    66.249.78.0/27
+    66.249.78.32/27
+    66.249.79.0/27
+    66.249.79.128/27
+    66.249.79.160/27
+    66.249.79.192/27
+    66.249.79.224/27
+    66.249.79.32/27
+    66.249.79.64/27
+    66.249.79.96/27
+  '';
 }
diff --git a/nixos/hosts/frankfurt-linode-01/wireguard.nix b/nixos/hosts/frankfurt-linode-01/wireguard.nix
index d996517a..0b7b8a24 100644
--- a/nixos/hosts/frankfurt-linode-01/wireguard.nix
+++ b/nixos/hosts/frankfurt-linode-01/wireguard.nix
@@ -2,10 +2,9 @@
 
   # Allow these hosts to directly communicate with their hostnames 
   networking.extraHosts = ''
-    10.100.0.1 osaka-linode-01
-    # 10.100.0.2 headscale.sysctl.io
-    10.100.0.3 backups-rpi4
-    10.100.0.4 frankfurt-linode-01
+    10.100.0.1 osaka-linode-01-wg
+    10.100.0.3 backups-rpi4-wg
+    10.100.0.4 frankfurt-linode-01-wg
   '';
 
   networking.firewall.allowedUDPPorts = [ 51820 ];
diff --git a/nixos/hosts/osaka-linode-01/default.nix b/nixos/hosts/osaka-linode-01/default.nix
index dfeb5a9d..17dec1ad 100644
--- a/nixos/hosts/osaka-linode-01/default.nix
+++ b/nixos/hosts/osaka-linode-01/default.nix
@@ -1,11 +1,11 @@
 { lib, modulesPath, hostname, ... }: {
   imports = [ 
     (modulesPath + "/profiles/qemu-guest.nix")
+    (import ../../common/containers/derp.nix { domainName = "osaka.sysctl.io"; })
     ../../common/services/tailscale-autoconnect.nix
+    ../../common/services/docker.nix
     ./firewall.nix
     ./wireguard.nix
-    ../../common/services/docker.nix
-    (import ../../common/containers/derp.nix { domainName = "osaka.sysctl.io"; })
   ];
 
   boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" "sd_mod" ];
@@ -26,9 +26,9 @@
   boot.loader.timeout = 10;
 
   fileSystems."/" = { 
-      device = "/dev/disk/by-label/nixos";
-      fsType = "ext4";
-    };
+    device = "/dev/disk/by-label/nixos";
+    fsType = "ext4";
+  };
 
   swapDevices = [ { device = "/dev/disk/by-label/linode-swap"; } ];
   
diff --git a/nixos/hosts/osaka-linode-01/firewall.nix b/nixos/hosts/osaka-linode-01/firewall.nix
deleted file mode 100644
index c27416bb..00000000
--- a/nixos/hosts/osaka-linode-01/firewall.nix
+++ /dev/null
@@ -1,376 +0,0 @@
-{ pkgs, ... }: {
-  networking = {
-    firewall = {
-      enable = true;
-      allowedTCPPorts = [
-        80    # HTTP
-        443   # HTTPS
-        42420 # Vintage Story
-        25565 # Minecraft
-        1443  # Headscale DERP (tcp)
-        25    # Mailserver
-        143   # Mailserver
-        465   # Mailserver
-        587   # Mailserver
-        993   # Mailserver
-        4190  # Mailserver
-        4443  # Jitsi
-      ];
-      allowedUDPPorts = [
-        3478  # Headscale DERP (udp)
-        10000 # Jitsi Meet (udp)
-        15636 # Enshrouded - Game
-        15637 # Enshrouded - Query Port
-      ];
-    };
-
-    nftables = {
-      enable = true;
-      ruleset = ''
-          table ip nat {
-            chain PREROUTING {
-              type nat hook prerouting priority dstnat; policy accept;
-              iifname "enp0s4" udp dport 10000 dnat to 10.100.0.2:10000;
-              iifname "enp0s4" udp dport 15636 dnat to 10.100.1.2:15636;
-              iifname "enp0s4" udp dport 15637 dnat to 10.100.1.2:15637;
-            }
-          }
-      '';
-    };
-
-    nat = {
-      enable = true;
-      internalInterfaces = [ "enp0s4" ];
-      externalInterface = "wireguard0";
-      forwardPorts =  [
-        { sourcePort = 10000; proto = "udp"; destination = "10.100.0.2:10000"; }
-        { sourcePort = 15636; proto = "udp"; destination = "10.100.1.2:15636"; }
-        { sourcePort = 15637; proto = "udp"; destination = "10.100.1.2:15637"; }
-      ];
-    };
-  };
-
-  environment.systemPackages = [ pkgs.cacert ];
-
-  services.haproxy = {
-    enable = true;
-    config = ''
-      defaults
-        timeout connect 10s
-        timeout client 30s
-        timeout server 30s 
-        maxconn 3000 
-        log global
-
-      frontend http
-        mode http
-        bind :80
-        # bind :443 ssl crt /Storage/Data/Docker/sysctl.io/letsencrypt/external/*.sysctl.io/combined.pem
-        
-        acl is-blocked-ip src -f /etc/haproxy-blocked-ips
-        http-request deny if is-blocked-ip
-
-        http-request redirect scheme https unless { ssl_fc }
-        default_backend backend_http
-      backend backend_http
-        mode http
-        option forwardfor
-        option forwarded
-        # server framework-server 10.100.0.2:443 ssl verify required ca-file ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt sni req.hdr(Host)
-        server framework-server 10.100.0.2 
-        
-      frontend tcp
-        mode tcp
-        bind :25565 
-        bind :4443  
-        bind :443  
-        
-        acl is-blocked-ip src -f /etc/haproxy-blocked-ips
-        http-request deny if is-blocked-ip
-
-        default_backend backend_tcp 
-      backend backend_tcp
-        mode tcp
-        server framework-server 10.100.0.2
-
-      frontend mail 
-        mode tcp
-        bind :25
-        bind :143
-        bind :465
-        bind :587
-        bind :993
-        bind :4190
-        default_backend backend_mail 
-      backend backend_mail
-        mode tcp 
-        server mailserver-wg 10.100.1.3
-
-      frontend vintage-story
-        mode tcp 
-        bind :42420
-        default_backend backend_vintage-story 
-      backend backend_vintage-story
-        mode tcp
-        server vintage-story-wg 10.100.1.5
-    '';
-  };
-
-  environment.etc."haproxy-blocked-ips".text = ''
-    # https://openai.com/searchbot.json
-    20.42.10.176/28
-    172.203.190.128/28
-    51.8.102.0/24
-
-    # https://openai.com/chatgpt-user.json
-    # 23.98.142.176/28 
-    # 40.84.180.224/28 
-    # 13.65.240.240/28 
-    # 20.97.189.96/28 
-    # 20.161.75.208/28 
-    # 52.225.75.208/28 
-    # 52.156.77.144/28 
-    # 40.84.221.208/28 
-    # 40.84.221.224/28 
-    # 40.84.180.64/28 
-    # 23.98.179.16/28 
-
-    # https://openai.com/gptbot.json
-    # 52.230.152.0/24 
-    # 52.233.106.0/24 
-    # 20.171.206.0/24 
-
-    # https://developers.google.com/search/apis/ipranges/googlebot.json
-    2001:4860:4801:10::/64
-    2001:4860:4801:11::/64
-    2001:4860:4801:12::/64
-    2001:4860:4801:13::/64
-    2001:4860:4801:14::/64
-    2001:4860:4801:15::/64
-    2001:4860:4801:16::/64
-    2001:4860:4801:17::/64
-    2001:4860:4801:18::/64
-    2001:4860:4801:19::/64
-    2001:4860:4801:1a::/64
-    2001:4860:4801:1b::/64
-    2001:4860:4801:1c::/64
-    2001:4860:4801:1d::/64
-    2001:4860:4801:1e::/64
-    2001:4860:4801:1f::/64
-    2001:4860:4801:20::/64
-    2001:4860:4801:21::/64
-    2001:4860:4801:22::/64
-    2001:4860:4801:23::/64
-    2001:4860:4801:24::/64
-    2001:4860:4801:25::/64
-    2001:4860:4801:26::/64
-    2001:4860:4801:27::/64
-    2001:4860:4801:28::/64
-    2001:4860:4801:29::/64
-    2001:4860:4801:2::/64
-    2001:4860:4801:2a::/64
-    2001:4860:4801:2b::/64
-    2001:4860:4801:2c::/64
-    2001:4860:4801:2d::/64
-    2001:4860:4801:2e::/64
-    2001:4860:4801:2f::/64
-    2001:4860:4801:31::/64
-    2001:4860:4801:32::/64
-    2001:4860:4801:33::/64
-    2001:4860:4801:34::/64
-    2001:4860:4801:35::/64
-    2001:4860:4801:36::/64
-    2001:4860:4801:37::/64
-    2001:4860:4801:38::/64
-    2001:4860:4801:39::/64
-    2001:4860:4801:3a::/64
-    2001:4860:4801:3b::/64
-    2001:4860:4801:3c::/64
-    2001:4860:4801:3d::/64
-    2001:4860:4801:3e::/64
-    2001:4860:4801:40::/64
-    2001:4860:4801:41::/64
-    2001:4860:4801:42::/64
-    2001:4860:4801:43::/64
-    2001:4860:4801:44::/64
-    2001:4860:4801:45::/64
-    2001:4860:4801:46::/64
-    2001:4860:4801:47::/64
-    2001:4860:4801:48::/64
-    2001:4860:4801:49::/64
-    2001:4860:4801:4a::/64
-    2001:4860:4801:50::/64
-    2001:4860:4801:51::/64
-    2001:4860:4801:53::/64
-    2001:4860:4801:54::/64
-    2001:4860:4801:55::/64
-    2001:4860:4801:60::/64
-    2001:4860:4801:61::/64
-    2001:4860:4801:62::/64
-    2001:4860:4801:63::/64
-    2001:4860:4801:64::/64
-    2001:4860:4801:65::/64
-    2001:4860:4801:66::/64
-    2001:4860:4801:67::/64
-    2001:4860:4801:68::/64
-    2001:4860:4801:69::/64
-    2001:4860:4801:6a::/64
-    2001:4860:4801:6b::/64
-    2001:4860:4801:6c::/64
-    2001:4860:4801:6d::/64
-    2001:4860:4801:6e::/64
-    2001:4860:4801:6f::/64
-    2001:4860:4801:70::/64
-    2001:4860:4801:71::/64
-    2001:4860:4801:72::/64
-    2001:4860:4801:73::/64
-    2001:4860:4801:74::/64
-    2001:4860:4801:75::/64
-    2001:4860:4801:76::/64
-    2001:4860:4801:77::/64
-    2001:4860:4801:78::/64
-    2001:4860:4801:79::/64
-    2001:4860:4801:80::/64
-    2001:4860:4801:81::/64
-    2001:4860:4801:82::/64
-    2001:4860:4801:83::/64
-    2001:4860:4801:84::/64
-    2001:4860:4801:85::/64
-    2001:4860:4801:86::/64
-    2001:4860:4801:87::/64
-    2001:4860:4801:88::/64
-    2001:4860:4801:90::/64
-    2001:4860:4801:91::/64
-    2001:4860:4801:92::/64
-    2001:4860:4801:93::/64
-    2001:4860:4801:c::/64
-    2001:4860:4801:f::/64
-    192.178.5.0/27
-    192.178.6.0/27
-    34.100.182.96/28
-    34.101.50.144/28
-    34.118.254.0/28
-    34.118.66.0/28
-    34.126.178.96/28
-    34.146.150.144/28
-    34.147.110.144/28
-    34.151.74.144/28
-    34.152.50.64/28
-    34.154.114.144/28
-    34.155.98.32/28
-    34.165.18.176/28
-    34.175.160.64/28
-    34.176.130.16/28
-    34.22.85.0/27
-    34.64.82.64/28
-    34.65.242.112/28
-    34.80.50.80/28
-    34.88.194.0/28
-    34.89.10.80/28
-    34.89.198.80/28
-    34.96.162.48/28
-    35.247.243.240/28
-    66.249.64.0/27
-    66.249.64.128/27
-    66.249.64.160/27
-    66.249.64.224/27
-    66.249.64.32/27
-    66.249.64.64/27
-    66.249.64.96/27
-    66.249.65.0/27
-    66.249.65.160/27
-    66.249.65.192/27
-    66.249.65.224/27
-    66.249.65.32/27
-    66.249.65.64/27
-    66.249.65.96/27
-    66.249.66.0/27
-    66.249.66.160/27
-    66.249.66.192/27
-    66.249.66.32/27
-    66.249.66.64/27
-    66.249.66.96/27
-    66.249.68.0/27
-    66.249.68.32/27
-    66.249.68.64/27
-    66.249.69.0/27
-    66.249.69.128/27
-    66.249.69.160/27
-    66.249.69.192/27
-    66.249.69.224/27
-    66.249.69.32/27
-    66.249.69.64/27
-    66.249.69.96/27
-    66.249.70.0/27
-    66.249.70.128/27
-    66.249.70.160/27
-    66.249.70.192/27
-    66.249.70.224/27
-    66.249.70.32/27
-    66.249.70.64/27
-    66.249.70.96/27
-    66.249.71.0/27
-    66.249.71.128/27
-    66.249.71.160/27
-    66.249.71.192/27
-    66.249.71.224/27
-    66.249.71.32/27
-    66.249.71.64/27
-    66.249.71.96/27
-    66.249.72.0/27
-    66.249.72.128/27
-    66.249.72.160/27
-    66.249.72.192/27
-    66.249.72.224/27
-    66.249.72.32/27
-    66.249.72.64/27
-    66.249.72.96/27
-    66.249.73.0/27
-    66.249.73.128/27
-    66.249.73.160/27
-    66.249.73.192/27
-    66.249.73.224/27
-    66.249.73.32/27
-    66.249.73.64/27
-    66.249.73.96/27
-    66.249.74.0/27
-    66.249.74.128/27
-    66.249.74.32/27
-    66.249.74.64/27
-    66.249.74.96/27
-    66.249.75.0/27
-    66.249.75.128/27
-    66.249.75.160/27
-    66.249.75.192/27
-    66.249.75.224/27
-    66.249.75.32/27
-    66.249.75.64/27
-    66.249.75.96/27
-    66.249.76.0/27
-    66.249.76.128/27
-    66.249.76.160/27
-    66.249.76.192/27
-    66.249.76.224/27
-    66.249.76.32/27
-    66.249.76.64/27
-    66.249.76.96/27
-    66.249.77.0/27
-    66.249.77.128/27
-    66.249.77.160/27
-    66.249.77.192/27
-    66.249.77.224/27
-    66.249.77.32/27
-    66.249.77.64/27
-    66.249.77.96/27
-    66.249.78.0/27
-    66.249.78.32/27
-    66.249.79.0/27
-    66.249.79.128/27
-    66.249.79.160/27
-    66.249.79.192/27
-    66.249.79.224/27
-    66.249.79.32/27
-    66.249.79.64/27
-    66.249.79.96/27
-  '';
-}
diff --git a/nixos/hosts/osaka-linode-01/wireguard.nix b/nixos/hosts/osaka-linode-01/wireguard.nix
index 1ff77890..e88357b5 100644
--- a/nixos/hosts/osaka-linode-01/wireguard.nix
+++ b/nixos/hosts/osaka-linode-01/wireguard.nix
@@ -2,10 +2,9 @@
 
   # Allow these hosts to directly communicate with their hostnames 
   networking.extraHosts = ''
-    10.100.0.1 osaka-linode-01
-    # 10.100.0.2 headscale.sysctl.io
-    10.100.0.3 backups-rpi4
-    10.100.0.4 frankfurt-linode-01
+    10.100.0.1 osaka-linode-01-wg
+    10.100.0.3 backups-rpi4-wg
+    10.100.0.4 frankfurt-linode-01-wg
   '';
 
   networking.firewall.allowedUDPPorts = [ 51820 ];
diff --git a/wallpapers b/wallpapers
index 26552d8b..8ed82c9a 160000
--- a/wallpapers
+++ b/wallpapers
@@ -1 +1 @@
-Subproject commit 26552d8bade6fa39188ebf68e9ffa1a8dcd75108
+Subproject commit 8ed82c9afaac6359cf4603196f7a5bd4b399a4b5