For folks that are unable to port forward on the local router (eg CGNAT) I made this post on doing it via a VPS. I’ve scoured the internet and didn’t find a complete guide.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    18 days ago

    In most environments ipv6 bypasses cgnat (because, why would you need a nat with ipv6).

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 days ago

      Like I said ip6 is useless when it comes to torrenting. Even if the tracker supports it it’s not persavive with users connecting to you.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        18 days ago

        The general topic was about self-hosting. IPv6 is very useful for self-hosting,… connections.

        I’ll admit there is a critical mass problem with torrenting clients, but if you’re trying to set up a wire guard tunnel with your friends, IPv6 is a absolute banger

    • Schlemmy@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      19 days ago

      I’ve set up some tunnels. Works nice but then the voices came. ‘Why would you trust a company like Cloudflare with all your data?’ ‘Why rely on this one company for all your services?’

      Nearly a year into my selfhosting journey and I’m more confused than ever.

      • EmbarrassedDrum@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        19 days ago

        tl;dr: classic convenience/privacy. depends on your threat model. surely better than Google. models of zero trust will help.

        That’s a great question, that I have asked myself before too. It doesn’t have one answer, and any one would make their own choices based on their own respective threat model. I’ll answer you with some of my thoughts, and why I do use their services.

        I’ll take as an example my usage of NextCloud, coming as a replacement to Google Drive for example.

        let’s break up the setups:

        1. client (mobile app, desktop client, browser)
        2. communication to server
        3. server

        It’s oversimplified, but to the point: In Google’s setup, you have control of 0 out of three things.

        1. you use their closed source client, 2. they decide the communication to the server (if there’s any CDN, where their servers located, TLS version), and 3. data is on their servers, wether encrypted or not is up to them.

        In NextCloud’s setup,

        1. The clients are open source (you can varify them, or build your own),
        2. communication to server is up to you. and in this case you trust your data with CF, that’s right. gonna have to trust them.
        3. server is your server, and you encrypt the files how you want.

        From just this look, NC is clearly better off. now, it’s not perfect, and each one will do their own convenience vs privacy deal and decide their deal.

        If you deploy some sort of e2ee, the severity level of CF drops even more, because they’re exposed to less data. specifically for NC they do do e2ee, but each solution to its own. https://nextcloud.com/encryption/ this goes as an example for zero trust model. if you handle the encryption yourself (like using an e2ee service), you don’t have to trust the medium your data is going through. like the open internet.

        • Schlemmy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          18 days ago

          Thanks. I agree with your conclusion. I probably have spent too much time in privacy communities. In the end you’ll have to trust someone.