Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (donβt cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I laughed but I dunno about you guys but I don't publicly self host anything. If you can't auth via ssh or VPN then you're not accessing a damn thing from my home network. I've got multiple routers that I could set up some isolation with but it's just too close to home.
Inside the home even.
Can't get hacked if all your services are down because you can't get those cocksuckingmothershitbitchingassbastard routing tables right π€―
The connection is coming from INSIDE THE ~~house~~ INSTANCE!
Me having everything open: Come here mother***s I am waiting for all of you.
VPNs? Cloudfare? Cloudfare Tunnels? Tailscale? What's all that? Here we are fighters not pus***s.
(Just kidding about the previos comments haha, well I have it open but it's not on my home network... so slightly less problematic and tbh I am planning on closing some stuff, plus all is behind logins, and tbh I kind of like to be able to access to it from anywhere/any computer without having to use any special connection)
Well, now I'm worried about my security. I have an ngrok tunnel running inside a container on a raspberry pi. Do I need to worry about my other devices or if someone tries to attack me only the container is affected?
Ah the magic of buffers.