

What child has a VPN ?
Served in the Krogan uprisings. Now I run a podcast
What child has a VPN ?
Well i have the rp as i only want one port exposed. I have separate networks per service too to isolate things. Only the things that need to talk to each other can.
My stuff is only accessible on the lan and via the vpn and even then only certain ips have access to certain things.
In your case it might be different , but generally a reverse proxy is better as you can have a single point of access to secure and you are not exposing all of your ports to the host or the internet.
You can use a ddns such as duckdns or host on github pages with jekyll or something
Debian on the host and everything else in containers
I have the arr stack connected to gluetun doing its thing and then wireguard on the host. I only expose my reverse proxy to the host and can connect to the services through that.
Note the networks below, vpn_net allows it to talk to the gluetun network which has the other stuff. The gluetun and arr stuff are in a separate compose file that defines the network. Then the non vpn stuff connects to that network when it comes up
nginx:
image: nginx:1.25.4-alpine-slim
container_name: nginx
restart: always
volumes:
- /etc/letsencrypt/:/etc/letsencrypt/
- ./nginx/nginx.conf:/etc/nginx/nginx
- ./nginx/conf/:/etc/nginx/conf.d/:ro
- ./nginx/htpasswd:/etc/apache2/.htpasswd:ro
- /var/log/nginx:/var/log/nginx/
- ./www/html/:/var/www/html/:ro
- ./content/Movies:/var/www/media/Movies:ro
- ./content/Shows:/var/www/media/Shows:ro
ports:
- 443:443
security_opt:
- no-new-privileges
networks:
- reverse-proxy_service1
- reverse-proxy_serviceN
- vpn-stack_vpn-net
depends_on:
- service1
- serviceN
I do monthly backups with cron and tar and syncthing for my containers.
I do quarterly backups of my server (14TB) to external USB HDDs. This is done via a script that mounts the drives, runs rsync to copy, then unmounts the drives again and emails me when it is done. I dont bother encrypting them as it ia mainly just media.
Good to see more software offering an fdroid option.
Use a sim in a portable hostpot or a second dumb phone powered off
Financially they use trusts and LLCs to shield their assets so they are not in their names or directly owned.
They can afford to hire specialists
If i dont know the number i dont answer, if they ring again and its spam i block the number. I also only answer if its from my country.
Fartsniffer 🤣
They will probably just show message to Swedish ip addresses and state that they cannt provide you with the binary as you are using a Swedish ip.
Something very clear to say use a VPN 😉
If you trust the initial install then unless there is a warning about the signing key you are good. Only signal devs can sign the builds so if you installed the play store version then updated with their standalone apk or fdroid version then it should just work as the signing key is the same.
Guardian project are just publishing signals apk files as the signature matches.
Buy a cheap second hand phone just for those apps and leave it at home… That way if you lose your phone you are not locked out
Also the FBI took signal to court and the only data they could provide was the date of signup and last login timestamp
I have something similar . I have WG on the host to access my services and gluetun in a container using openvpn for specific services.
In my case I have the host wg pass through connections to the outside via iptables rules but I’m not forwarding the connection to gluetun. I have the ip of my server as my ip.
In your case as you want a commercial vpn ip as your exit ip you would need to use iptables to pass traffic between the 2 networks .
No issues at the moment but need to update a few containers when I get the chance. I also need to set up contacts sync in radicale for the address book and integrate it with Thunderbird and davdroid.
In the near term I’ve been working on a plan to make sure my keepass db is accessible to my SO and family in the event of my demise. I recently lost a dear friend and had to gain access to his stuff for his family, luckily he didn’t have the linux partition encrypted so I got a recovery shell then remounted the disk and changed the password and could then also mount the windows partition once I logged in.
It made me think as all my stuff is encrypted and there is no way someone would guess it nor crack it so I’m writing documentation and leaving it with family members.
The documentation explains how to use keepass and who to contact for support. Im leaving the db with family members and the password with a select few people that dont have the db. My SO will have access to all the info too.
I’ll update the db periodically and give them a newer version but keep the same password
I encourage you all to consider this too.
The trick is to do it during work
Freedom isn’t free, its a hefty fuckin fee …