https, wireguard and mumble.
Just set up shodan monitoring, use burpsuite or owasp zap, and check your pcap files for accidental plaintext.
Also ssllabs has a nice website checker.
And get a NGFW
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
No spam posting.
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
No trolling.
Resources:
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
https, wireguard and mumble.
Just set up shodan monitoring, use burpsuite or owasp zap, and check your pcap files for accidental plaintext.
Also ssllabs has a nice website checker.
And get a NGFW
I'd if I could, but CGNAT.
This year I started using DynDNS with only my IPv6 address since IPv4 is behind CGNAT and it actually works quite well nowadays
What do you mean works? Like you could access from everywhere some services like Plex or Nextcloud?
yes just like with a static IPv4
Ok, I'm not sure of how exactly this works, but I'm gonna check it out since I have IPv6 addresses.
Just to be clear, even from IPv4 only can access my exposed services?
If you expose ports on IPv4 or IPv6 (port forwarding) anyone can access the service behind these ports if they know your address but so do you too