[-] hayalci@fstab.sh 3 points 1 month ago

So gist of this is, of they are not some random people hiding, but there's a real company to -presumably- reap in some ad money or subscription money for their StalkerPlus product.or something, it takes a single determined EU citizen to fuck them up.

[-] hayalci@fstab.sh 3 points 6 months ago

6GB is more than enough for many desktop environments. Plus, a server wouldn't have any anyway. not booting the Ubuntu installer seems like a bug, or other non-resource problem. if you try with a newer installer, or some other distro, that computer can host many things.

[-] hayalci@fstab.sh 4 points 7 months ago

Case dismissed!

[-] hayalci@fstab.sh 2 points 7 months ago

You can use Snikket with other servers too, there is no restriction or special sauce. It's mostly a fork of Conversations.

[-] hayalci@fstab.sh 4 points 7 months ago

in addition to "dedicated Nas + compute node" and "just use a desktop" suggestions, there's the microserver option in between. Small, but has enough power to run stuff other than storage.

Hp proliant microserver is what I use, you can try getting a previous generation from second hand market.

https://www.hpe.com/us/en/product-catalog/compute/proliant-servers/pip.proliant-microserver.1014673551.html

[-] hayalci@fstab.sh 5 points 8 months ago

+1 on not using containers.for Network routing stuff That way lies pain and misery.

[-] hayalci@fstab.sh 3 points 8 months ago

Good point, kernel updates should be paired with reboots to get kernel patches applied quickly.

Yes wireguard would only accept connections clfrom clients with known certificates, but this is "belt and suspenders" approach. What happens if there's a bug in wireguards packet parsing or certificate processing? Using port knocking would protect against this —very remote— possibility.

[-] hayalci@fstab.sh 3 points 8 months ago

VPN software usually is built strong to begin with, and any vulnerabilities discovered will be promptly fixed as well, so updating frequently should suffice. (Why not automate it with unattended-upgrades package?

Using a random high port number will probably hide it well enough for Internet-wide port scanners as well.

if you want to be extra paranoid, you can hide the VPN service behind a port knocker as well.

[-] hayalci@fstab.sh 2 points 8 months ago

keepass2android is worth a try as well.

[-] hayalci@fstab.sh 4 points 9 months ago

Ah true. Companies are great at hiding the open web that they (ab)use.

[-] hayalci@fstab.sh 4 points 10 months ago
view more: ‹ prev next ›

hayalci

joined 11 months ago