You can RDP in with a toaster these days.
Okay, maybe not a toaster. But you can use any old piece of junk you have lying around. Even a phone.
You can RDP in with a toaster these days.
Okay, maybe not a toaster. But you can use any old piece of junk you have lying around. Even a phone.
Absolutely, in fact I’d be willing to bet vaultwarden does just that. That’s a good point.
I don’t understand it tbh. Password managers and email are the main things I avoid self hosting. Email because it’s just too easy to fuck something up and never realize you’re not actually properly sending/receiving email. And password managers because if I lose access to it, I’m kinda royally fucked. And the password managers I use keeps a local copy of your database that gets periodically updated, so even without internet I do still have access.
Yes, the one you host will continue to work assuming it doesn’t have an IP that is easily tied to a Datacenter.
TLDR for anyone reading: Do not do this!
There is a very well laid out reason by @becausechemistry@lemm.ee in this thread, but suffice to say this is dangerous to an extreme and is not worth the risk to save a little money.
Nah, wildcard cert wouldn’t play into it at all.
Innit?
<.< My friend, look at the first of the two presented options.
Yes, most here will self host it. The app at least presents the concept of a centralized host as an option.
Safer is a matter of opinion. You’re moving your trust from one company to another, that doesn’t necessarily equate more safety. How do you trust the safety of companies?
As for less fragile, that is patently untrue. You have all the same failure points as previous, but now must manage the update schedule of another server, and have the added reliance on a third party host. You’ve increased fragility if anything.
?? Your solution to dynamic dns is to run all the traffic through a static IP vps? Are you paying for this VPS, or are you saying you trust the host more than you trust cloudflare, because they give you a free VPS?
From reading the learn more link, it’s meant to just give them info on what ads worked. They would absolutely want this info, even if it was just “the ad you ran last week resulted in a dozen sales.”
Why would you think otherwise?
No? If it’s anonymized to “someone somewhere clicked this ad” that’s not possible to de-anonymize.
Do I expect it to be that anonymized? No. But the idea that it is always possible to de-anonymize data is just plum wrong.
??? Your original proposed solution is literally a bandaid fix.
Yeah, I’ve been looking for this as well. I’ve got a constant check engine light because the catalytic converter is dead, and that’s about the only thing on the car I don’t care about.
Let’s say notifications are like walkie-talkies. You push a button, it sends an alert or your voice to the paired device. Neither one is storing the information, they are just relaying to each other. Now, in this case the government has issued a court order stating that a third party be given a walkie-talkie with the ability to understand the information transmitted by the first. There is still no storage being done, but a second party now receives all the information being broadcast.
It’s not about not having the information. You don’t actually need to store it anywhere to facilitate communication, at least beyond it being in memory which most would agree doesn’t constitute storage in this situation.
Now, could that third party store the information? Absolutely.
Capture and relay have nothing to do with storage. You can absolutely add storage, but it is in no way a necessary step.
My friend, did you read what the article you linked says? That isn’t storing the data, that’s capturing the data and relaying it, as directed by court order.
… what?
Them: “I want a centralized place to handle all my graphics stuff, so I can access graphically intensive things from any device.”
You: “Must be incest renders because you already have hardware and say you use it for work.”
So according to you, contractors don’t exist, iPhones can play PC games, and anyone wanting to split PC resources between multiple use cases is shady.
What’s ridiculous is that you seem to think extreme paranoia is a normal thing in everyday life.
Most people are under the impression that their IP being public is somehow super dangerous, and that “hackers will attack me” if it ever gets out. So likely “all the attacks against my entire network.”
Edit: Secondary thought, they legitimately have unsecured endpoints on their IP, and are hoping no one will notice if they aren’t handing out their IP to others. Still incorrect though.
Haha, yeah I didn’t necessarily mean for CAD work, though I suppose you could get a mouse and keyboard to make it more tolerable.