I do exactly this with traefik.
ie: Seafile.domain.com
Vaultwarden.local.domain.com
I followed this guide: https://youtu.be/liV3c9m_OX8
I do exactly this with traefik.
ie: Seafile.domain.com
Vaultwarden.local.domain.com
I followed this guide: https://youtu.be/liV3c9m_OX8
I've recently started using a kanban board which has been working well for me.
There are several options, I use obsidian for this because I can easily make a task into a note for further details.
Not FOSS of course but the .md file are easy to access and backup and i use the self hosted live-sync plugin to sync between 3 devices
Can AUR be used by other distros like Debian or fedora?
I suspect most people open it via subdomain or cloudflare tunnel and it seems secure enough. Haven't seen reports of people getting hacked left and right.
VPN Certainly is more secure and works for a few people but becomes annoying if you have users that don't want to mess with a VPN. It also helps if you want to make a public share link to someone without an account.
This is a deep sleep issue. A google search will show that many modern processors can't actually deep sleep (S3) and therefore the only option is to hibernate or shut it off.
To find out if you can, sleep the computer, wake it up then run:
journalctl | grep S3
There should be a line about what type of sleep is available and another line about what type of sleep your computer was just in.
If S3 is not listed as an available sleep mode you might get lucky and be able to turn it on in the bios. If you can't then you are out of luck.
Since I use fedora atomic, I used this to turn on deep sleep:
rpm-ostree kargs --append="mem_sleep_default=deep"
On non atomic I forget exactly how but I think this is the way: https://unix.stackexchange.com/questions/720514/cannot-write-into-sys-power-mem-sleep-in-fedora-36
Lemmy needs a best comment section like reddit had
Wireguard uses public and private keys which are designed from the ground up to be used over plain text to establish the handshake so it isn't an issue. Same idea with ssh keys and ssl keys
Split tunneling with wireguard is probably the best way for this.
There are many tutorials, here's an example: https://ssh.sshslowdns.com/wireguard-split-tunnel-config/
This will let you have some things on wiregusard and some not
You do not need anything else. DNS requests are all sent over Wireguard with encryption
Use ddns on your router with a domain so you can then get something like wireguard.example.com and then use that as the endpoint in your wireguard.
Set the wireguard DNS as your pihole.
To make life easier set your home network IP space to something that another WiFi would never use, ie 192.168.46.xx
That way it will never conflict if you are on a public WiFi and you can access anything on your home lab when you need.
I've been using this setup for years on laptop, phone etc
Does this work with WhatsApp groups chat?