

and sponsorblock 👌
and sponsorblock 👌
project is here https://github.com/jaypyles/Scraperr
Yeah absolutely if he’s downloading Linux ISOs, just use a VPN and you’ll be fine 99% of the time. TOR if he is doing anything else surrupticiaous. 😬
Absolutely! Wireguard (for example) uses UDP 51820 (normally) which will mlre than likely be blocked, but that won’t stop you from using something like cntlm to proxy it over an allowed port like 443/80. DPI or some intercepting proxies would likely still filter it.
What PeerTube is BT based 😮 Based on what you are saying, can you just seed the normal torrent files to help, or would one need their own PT instance?
Client seperation is implemented by the AP. There’s lots of info, it’s called client isolation normally. check this out
Good explanation, a note that most public WiFi will use client separation. Macca’s, starbucks, airplanes etc you will only ever see your device and the gateway. (More for other people that are reading, I assume you know this 😄)
It depends on his threat model and what he’s trying to hide really. Public WiFi is fine, as long as you validate/check the SSL cert it’s using is from your bank and is legitimate. Using public WiFi with a VPN is more secure as long as you trust your VPN provider. If he’s asking these questions, then he’s probably not doing banking though, and should ideally be using VPN+TOR or something similar.
Yes a VPN will hide your IP address from the server you’re connecting to. The VPN service will still see your IP and may log/record it. You also have to watch out for things like DNS leaks.
Probably because those are traditionally traffic light colors, used to indicate success or failure.
LMAO they really are inept 🤦♂️
I’ve moved a couple of domains to dnssec and it’s great, simple DNS.
Yeah the whole app is really responsive, works great on minimal resources. Excellent for sharing hikes and trails!
Have you seen owntracks? They have client apps too.
It’s all teapots all the way down.
Same! Two zpools on one Debian VM, shares NFS etc for everything else. I pass through PCIe sata cards to the VM, too.
Still does nothing when scanning the entire ipv4 address space achievable so quickly. You can also use services like shodan to find vulnerable services on any ports.
Use SSH keys, stay upgraded. Make management services (SSH, RDP, admin services) accessible only via VPN (WireGuard). Only expose 80 and 443 to the internet, if necessary.
Never heard of DeSEC before, but it looks damn cool! Been looking to get away from CloudFlare.
Not open source… Kinda trash move.
hell yeah this looks sick!! I rolled my own speedtest container that sends the results to homeassistant but this seems like a great solution. I will have to try it - I hope I can still send the results to homeassistat.