

This comment section is… something.
If you host the bridges yourself, it makes no difference to privacy.
It’s simply convenient to have all chats in one place 🤷🏼♀️
This comment section is… something.
If you host the bridges yourself, it makes no difference to privacy.
It’s simply convenient to have all chats in one place 🤷🏼♀️
Grew up on it. My dad set up a Ubuntu 4.10 PC for my brother and I when we were 3/5 (no internet, obv), and it stuck.
Used Windows for a brief time in highschool to be able to play online with friends.
Went right back to Linux when going to university. Will never change back, both for ideological reasons and because Linux is just better.
Next step: NixOS on a phone
TBH, it sounds like you have nothing to worry about then! Open ports aren’t really an issue in-and-on itself, they are problematic because the software listening on them might be vulnerable, and the (standard-) ports can provide knowledge about the nature pf the application, making it easier to target specific software with an exploit.
Since a bot has no way of finding out what services you are running, they could only attack caddy - which I’d put down as a negligible danger.
My ISP blocks incoming data to common ports unless you get a business account.
Oof, sorry, that sucks. I think you could still go the route I described though: For your domain example.com
and example service myservice
, listen on port :12345
and drop everything that isn’t requesting myservice.example.com:12345
. Then forward the matching requests to your service’s actual port, e.g. 23456
, which is closed to the internet.
Edit: and just to clarify, for service otherservice
, you do not need to open a second port; stick with the one, but in addition to myservice.example.com:12345
, also accept requests for otherservice.example.com:12345
, but proxy that to the (again, closed-to-the-internet) port :34567
.
The advantage here is that bots cannot guess from your ports what software you are running, and since caddy (or any of the mature reverse proxies) can be expected to be reasonably secure, I would not worry about bots being able to exploit the reverse proxy’s port. Bots also no longer have a direct line of communication to your services. In short, the routine of “let’s scan ports; ah, port x is open indicating use of service y; try automated exploit z” gets prevented.
I am scratching my head here: why open up ports at all? It it just to avoid having to pay for a domain? The usual way to go about this is to only proxy 443 traffic to the intended host/vm/port based on the (sub) domain, and just drop everything else, including requests on 443 that do not match your subdomains.
Granted, there are some services actually requiring open ports, but the majority don’t (and you mention a webserver, where we’re definitely back to: why open anything beyond 443?).
Client side, under advanced:
That’s a setting
Alright, thanks for the info, that’s good to know. Trying to make the jump becomes more enticing every day.
Thanks for sharing! Sounds about as good/bad as I was expecting. How’s the browser experience? Also, are there any features/tweaks you are aware of that you could not get through Nix, that the more “commercial” Linux device manufacturers have developed for their devices?
Holy crap! A NixOS-on-phone user in the wild! You are rocking my dream setup. How’s your experience been with it? Is it remotely daily drivable for phone things?
What does this have to do with Privacy?
InfCloud. Works well with Radicale, and does contacts, too.
It’s not pretty, but works very well for the 5/100 times I want to check through a browser instead of Calendar app / Thunderbird.
Yes. Using simple-nixos-mailserver as the foundation.
Really great experience, and have had no deliverability issues.
Some might say interconnecting everything could be a legitimate goal. Nonetheless, some people started to report about huge amounts of data and metadata being sent to Matrix central servers.
Curious that this claim is without source in the original.
I also have porblems with their claims about bridges. Bridges are Band-Aids to allow you to communicate with people not on Matrix, not a dark masterplan to build a central spionage hub.
By default, a homeserver trusts matrix.org in questions of federation and identity of other servers. You have to get that trust from somewhere. You are free to choose another source for that.
(For example, my homeserver isn’t federated at all, and has that trusted server removed; it doesn’t communicate with anyone. Also it’s not synapse, but that’s besides the point.)
Out of curiosity, where on this curve lies “20k lines of Nix config”? (Asking for a friend 👀)
Please beware that DNS over TLS is transport protection; the dns server itself of course still sees and knows everything.
How exactly does Free, non-open-source software prevent that?
Fühl ich, Bruder.
Lol, exact same situation here.
Quick question, did the migration to continuwuity break calls for you as well?