this post was submitted on 03 Mar 2025
56 points (98.3% liked)

Selfhosted

43307 readers
261 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I'm having trouble staying on top of updates for my self hosted applications and infrastructure. Not everything has auto updates baked in and some things you may not want to auto update. How do y'all handle this? How do you keep track of vulnerabilities? Are there e.g. feeds for specific applications I can subscribe to via RSS or email?

you are viewing a single comment's thread
view the rest of the comments
[–] possiblylinux127@lemmy.zip 1 points 1 day ago (1 children)

What happens if they compromise your device in secret and use it as part of a botnet? Lots of state backed attacks rely on traffic relays provided by compromised devices.

[–] bluGill@fedia.io 1 points 1 day ago

My NAS is behind a firewall and doesn't normally run the types of things you would compromise. (no web browser). They need to break many things at the same time to compromise it. I'm not saying it would be impossible to compromise my NAS, but is is very unlikely just because of how difficult it is. If I'm target of a state level attack I'm sunk anyway.

though offline backups are always a good idea. However they by definition need several days to restore (if they take less than that they are too easy for an attacker to target)