Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (donβt cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
As an offensive security worker.... I can't help but read people listing out their attack surface π
My RISV-V server (I have removed all binary blobs and have no closed source code ofc) is airgapped inside a Faraday cage.
For security reasons I never turn it on.
I like how you think.
All my deploys are written in binary on a stack of index cards that we then burn, put in a zip lock bag, encase in concrete, surround in a welded closed steel box, and throw in the Mariana Trench. The documentation sucks though.
Nah, it's all safe, it's in containers
I'm not sure the list is really that big of a deal for a home gamer. They're probably more in danger from their choice of home audio appliances and that microwave that has been sitting on their network for 10 years which no longer gets updates. Or that 2019 Plex server they have put forwarded straight outside.
It's actually one of my beefs with containers, You can't keep track of The versions for everything and you're at the mercy of the maintainers to keep individual packages updated.
A lot of them are likely behind wireguard. At least, I hope a lot of them are.
You'd hope, but I have a few friends who simply port-expose their media servers.
I guess it could be worse if they had ssh exposed.
I'll have to disagree with you there. SSH is super well maintained and understood, and massively useful for the risk you do run. Who knows what's going on with all the random projects people are hosting. I'd rather have SSH exposed than almost anything else.
What would you do to provide access to some less tech savvy friends. I'm thinking of dropping a SBC with wireguard and a proxy onto a friend's network, that way everything is under my control, and I can lock down the wireguard connection however I want, but I haven't gone down that route yet.
I was thinking more along the lines of simply thowing up a port to SSH into. No Fail2Ban and no keys, just a password.
I would just containerize and reverse proxy, but I understand the hesitation, wireguard would be preferable.