Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Stop getting info from yt "infosec" channels.
No one uses single exit-entry gateways in tor anymore, and the widespread use of tor bridges, split exits and vpn (now that they're quite fast) means it's much easier for law enforcement to fingerprint traffic rather than sit and wait for someone to tilt their hand and reveal an exit node that will have moved in an hour anyway.
Think about it: if criminals were successfully moving illicit goods and hiding the comms, you think you would hear about it on YouTube, of all places?
You're saying law enforcement can easily fingerprint you? Or am I misreading what you're trying to say?
Yes. The days of Maltego are behind us, law enforcement now just file requests directly with Google.
Even on something like tor browser or tails?