- 0 Posts
- 34 Comments
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Your help needed: PhD research on why people choose to self-hostEnglish7·18 days agoWhen making an application instead of coding for one platform you have to code for 5 and also convince Apple and Google to accept your app (Nextcloud is really feeling this one).
Meanwhile HTML + JavaScript works on most smart fridges.
InnerScientist@lemmy.worldto Steam Deck@sopuli.xyz•Steam Deck sales still going strong over three years later2·1 month agoIt has exclusives iirc, steam deck “just” has the rest.
The switch also has coop multiplayer and a few other things going for it as well.
Tldr:
Rootful podman with
podman run --userns=auto
is more secure than one rootless host user running many pods, because those pods could (theoretically) attack each other.
though you still have the possibility of an exploit in the image pullRootless podman running one pod (as in service including database and so on) per host user with different subuid Ranges is the most secure, but you have to actually set that up which can be a lot of work depending on distribution.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Encrypting data on local servers?English1·2 months agoSomethign I haven’t seen mentioned yet is clevis and tang, basically if you have more than one server then they can unlock each other and if they’re spatially separated then it is very unlikely they get stolen at the same time.
Though you have to make sure it stops working when a server get stolen, using a mesh VPN works just as well after the server is stolen so either use public IPS and a VPN or use a hidden raspberry pi that is unlikely to be stolen or make the other server stop tang after the first one is stolen.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•On email privacy: can I store my own email and relay them through an email provider?English1·2 months agoLuckely we’re not relying on emails for security relevant and or private information, right?
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•On email privacy: can I store my own email and relay them through an email provider?English4·2 months agoThe emails are unencrypted, emails in transit are in transit between the e-mail servers and relays and use secure tls channels.
They are only encrypted from your phone/notebook/browser to the server, then when send they will be encrypted till the next server.Every server/relay first decrypts everything send to it, because it has to due to the TLS terminating at each server.
See also your source:
Transport Encryption: This form of encryption is used to secure your emails while they are transmitted over the internet. Most of today’s email services, including Gmail, employ transport layer security (TLS) to protect emails in transit. While it encrypts emails between servers, it doesn’t protect the content once it reaches the recipient’s inbox.1
In practical terms, Your e-mail server, your e-mail servers relay (if it has any) and your recipients relay server/server can all read your email unless
End-to-End Encryption (E2EE): E2EE takes encryption a step further. It ensures that only the sender and the recipient can decrypt and read the emails. Even the email service provider cannot access the contents of the email. E2EE is typically achieved through third-party encryption tools or services.1
Which takes active effort from both the sender and the recipient to make work - it’s almost only possible with people you know and little else.
1 https://umatechnology.org/gmails-new-encryption-can-make-email-safer-heres-why-you-should-use-it/
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Having trouble with my caddy congif for my lemmy instanceEnglish1·2 months agoYou can use caddy-l4 to redirect some traffic before (or after) tls and to different ports and hosts depending on FQDN.
Though that is still experimental.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•On email privacy: can I store my own email and relay them through an email provider?English91·2 months agoOnly thing I can comment on is that 99% of all E-Mails you will get are unencrypted and can be read by your relay. (There are few e2e encrypted emails being send.)
So either trust them or don’t use a relay.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Organic Maps migrates to Forgejo due to GitHub account blocked by Microsoft.English24·3 months agoStep 1: Get write access to the project you dislike.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Sanity check: am I crazy for wanting to wipe everything and do/learn from scratch?English4·3 months agoI recommend switching to NixOS only after you have a basic but broad understanding of Linux, many things in NixOS are more complicated than in “normal” Linux, which is needed to archive what it does, but is overwhelming for someone who doesn’t know the what and why and where that using Linux brings.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Open Source Github Repositories in Danger of being DeletedEnglish1·3 months agoYou triggered the independent thought alarm
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Need Support: DMZ at home with nginx proxy to LANEnglish3·4 months agoCheck DNS, MTU and do a full wireshark capture from the Client using both curl and the browser.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•What does the 3-2-1 rule look like for you?English1·4 months agoI didn’t consider it as valid, one on (phone and internal nvme1), the second one on nvme2 and the third one in the cloud.
Though I have only two copies of normal data myself, I consider live and cloud to be enough for most data. Everything very important has more backups in other ways (bitwarden has an exportable local version on every logged in device, images are stored in immich on my server making it 3 devices)
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•What does the 3-2-1 rule look like for you?English2·4 months ago- Maintain three (3) copies of your data: This includes the original data and at least two copies.
- Use two (2) different types of media for storage: Store your data on two distinct forms of media to enhance redundancy.
- Keep at least one (1) copy off-site: To ensure data safety, have one backup copy stored in an off-site location, separate from your primary data and on-site backups.
You have 3 copies, one on your phone and nvme, one on the backup nvme and one in the cloud. You have 2 media, internal SSD and cloud (your phone would count as a third if it wasn’t auto synced) You have 1 off-site in the cloud
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•What's up, selfhosters? - Sunday threadEnglish1·4 months agoFind a new service you like, add it using rootless podman. That way you can test it without affecting your running system.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Issue with wireguard and advance routingEnglish3·4 months agoTry
sysctl -w net.ipv4.conf.all.rp_filter=2
on the PC (not vps) or =0 if that doesn’t work
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Issue with wireguard and advance routingEnglish2·4 months agoDo a ping of 8.8.8.8 from your user, then open a new console and run tcpdump -i <interface> with first your uplink, then wg0. The packets should be seen on wg0 if they’re routed correctly and the problem then is on the vps side. Otherwise it’s a problem on your local config.
InnerScientist@lemmy.worldto Selfhosted@lemmy.world•Issue with wireguard and advance routingEnglish2·4 months agoDid you add the vps IP to the routing table of your user?
ip r add 10.0.0.2/32 dev wg0 table 1070
?
metallb sounds like what you need, basicall you give it a range in your subnet (excluded from dhcp/Router!) and it assigns those ips to your loadbalancer services, it broadcasts this IP over Arp or bgp which makes automatic failover work.