this post was submitted on 02 Jul 2023
1191 points (97.6% liked)

Selfhosted

40296 readers
217 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I'm already hosting pihole, but i know there's so much great stuff out there! I want to find some useful things that I can get my hands on. Thanks!

Edit: Thanks all! I've got a lil homelab setup going now with Pihole, Jellyfin, Paperless ngx, Yacht and YT-DL. Going to be looking into it more tomorrow, this is so much fun!

you are viewing a single comment's thread
view the rest of the comments
[–] bajabound@lemmy.world 34 points 1 year ago (4 children)

Running a Tor exit node could certainly be life changing. Not sure in a good way, guess it depends which country you live in.

[–] IsoKiero@sopuli.xyz 5 points 1 year ago

I did that for a while to try and learn about filtering malicious traffic from the network. Doing that long term would definetly change my life, but very much not in a good way. It's a endless whack-a-mole game and the winning prize is that your ISP doesn't give you a call weekly.

It took couple of weeks until the ISP first called and told me that I have malicious traffic coming from my IP. I explained the situation and their representative was very understanding and handled the thing as well as he ever could. I tried to adjust filters, blocklists and all the jazz which was pretty much a full time job already and I still couldn't make it work on a sufficient level. I got another couple of calls from ISP (again, handled spectaculary considering I was pushing several hundreds Mbps dirty traffic out in the wild) and eventually they just plainly said that they're forced to kill my connection if situation doesn't improve. I ran a node without exit for a while but as that's not a interesting thing to run I eventually shut it down to free resources for more interesting things.

If you have the time and knowledege to do that, I really encourage that, but for me it was too much to keep in the network while trying to maintain some sanity on my everyday life. I firmly believe that my goal of filtering malicious traffic out and keeping an exit node runnig is achievable goal, I just don't have enough knowledge nor time to gain enough of it to keep exit node running.

And of course there's legal issues as well and severity of them heavily depends on where you're living, so really do your homework before doing anything like that.

[–] randomguy2323@lemmy.fmhy.ml 5 points 1 year ago (1 children)

I was thinking about doing this but you can be a suspect on a criminal case if Tor is relaying ilegall activities.

[–] takeda@lemmy.world 11 points 1 year ago

Therefore the "life changing" aspect of it

[–] Vani@lemmy.world 4 points 1 year ago

Also worth noting, you don't have to run an exit node. And there is also the alternative to run a bridge or just snowflake.

[–] Vani@lemmy.world 1 points 1 year ago

Also worth noting, you don't have to run an exit node. And there is also the alternative to run a bridge or just snowflake.