![](https://lemmy.world/pictrs/image/ab6c1026-c17b-4d99-8f56-607b3dae407b.jpeg)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
lol
reverse proxies don’t add security
Citation?
lol
reverse proxies don’t add security
Citation?
And an iTunes card after converting bitcoin, for a tip.
So, you’ve gone from:
reverse proxies don’t add security
to:
“adding a proxy” does very little
What’s next?
Give up. You don’t know what the fuck you’re talking about.
Happy Birthday!
Your check’s in the Mayo!
…maybe use a reverse proxy…
+1 post.
I would suggest definitely reverse proxy. Caddy should be trivial in this use case.
cheers,
True, but I DON’T WANT TO SAVE CHANGES!! I DIDN’T MAKE CHANGES!!..N! N!
q
exit
^c
^C
quit
!q
:exit
^x
:x
^+alt+del
…system is rebooting
‘bloat’ lol.
We don’t need to know your pron prefs, pal!
Exit node is a VPS (Racknerd)
eta: it’s quite the deal tbh
Appreciate this.
Tailscale uses wireshark, which is peer-to-peer. Their “free” plan allows you to set up a network using their “coordination” server, which simplifies administration of your tailnet.
You control dns, exit nodes, etc, so tailscale isn’t involved with the vpn itself, hence no speed limits.
You ultimately determine what tailscale collects as far as client logging.
If you block client logging, Tailscale may not be able to provide technical support.
I imagine the docker image serves to eliminate tailscale from the equation.
ETA: there are quite a few ad-blocking dns servers.
I currently use nextdns.io
There are “public” pihole servers: use their dns, or the many other ad-blocking servers out there as the dns for your VPN.
Tbh, I’ve stopped the selfhosted vpn route and use tailscale (which can be selfhosted/has a docker image). It doesn’t get simpler.
/storage/emulated/0/Pictures/
is where it put mine…
I’m sure he’s feeling it regardless.