• 0 Posts
  • 117 Comments
Joined 2 years ago
cake
Cake day: July 7th, 2023

help-circle
  • Honestly, none that are all that great. I tried Kodi in various forms, LibreElec, OSMC, MythTV, Steam Big Picture, and KDE TV (or whatever its called), but you’re just never going to get a great experience with stuff like Netflix and YouTube on Linux.

    In the end, I bought myself an Nvidia Shield, switched out the launcher for one without ads, installed Smart Tube Next for ad-free YouTube, and I couldn’t be happier with the results. I’ve got my apps for Nebula and Dropout. I’ve got Kodi and Jellyfin for my home library. It has barely any power consumption, it boots fast, it runs a huge variety of emulators, the included remote works great (plus there’s a remote app for your phone that controls the entire system), and the wife acceptance factor is exceptional.

    I’m really big on self-hosting and building all my own stuff; I use lots of repurposed hardware salvaged from companies I and my friends work at and I try to avoid off the shelf products. But I’m genuinely kicking myself for not buying a Shield sooner. It really is the best TV solution for a self hoster.


  • We’ve implemented netbird at my company, we’re pretty happy with it overall.

    The main drawback is that it has no way of handling multiple different accounts on the same machine, and they don’t seem to have any plans for ever really solving that. As long as you can live with that, it’s a good solution.

    Support is a mixed bag. Mostly just a slack server, kind of lacking in what I’d call enterprise level support. But development seems to be moving at a rapid pace, and they’re definitely in that “Small but eager” stage where everything happens quickly. I’ve reported bugs and had them fixed the same day.

    Everything is open source. Backend, clients, the whole bag. So if they ever try to enshittify, you can just take your ball and leave.

    Also, the security tools are really cool. Instead of writing out firewall rules by hand like Tailscale, they have a really nice, really simple GUI for setting up all your ACLs. I found it very intuitive.






  • I’m a little confused on this point. I took a look at their whitepaper and it says that they’re not using blockchain at all. It’s some sort of proprietary peer to peer algorithm. Is this something that changed in implementation? I’m not really familiar with this project so I’m certainly not trying to defend anything, just unclear as to why people are calling it a blockchain project specifically.

    Edit: OK, after some more digging I see what people are talking about. The project itself isn’t blockchain based, but it’s run by a DAO that operates using a governance token, which is not exactly great.




  • Nvidia Shield. The regular version is $150 US and from what I understand it gives flawless playback. I have the pro version which is more powerful, but that’s specifically for running games.

    It’s Android TV OS, so app selection is great. You can load Smart Tube Next on there to get YouTube without ads, and there’s a very solid Jellyfin app. You can also use Kodi for local direct playback. Remote is perfectly functional, and you can use an app to rebind most of the keys.


  • This is the selfhosted community; Who are you training? In most cases there’s literally only one person who would ever need SSH access to this server. Maybe two or three in a tiny handful of cases, but anyone who can’t figure out Netbird in 30 seconds absolutely should not be accessing anything via SSH.

    And you’ve clearly never used Netbird, Tailscale, or any similar service, if you think that update, maintenance and config constitute any kind of meaningful burden, especially for something as simple as remote access to a VPS.






  • This is the correct answer. Never expose your SSH port on the public web, always use a VPN. Tailscale, Netmaker or Netbird make it piss easy to connect to your VPS securely, and because they all use NAT traversal you don’t have to open any ports in your firewall.

    Combine this with configuring UFW on the server (in addition to the firewall from the VPS provider - layered defence is king) and Fail2Ban. SSH keys are also a good idea. And of course disable root SSH just in case.

    With a multi-layered defence like this you will be functionally impervious to brute force attacks. And while each layer of protection may have an undiscovered exploit, it will be unlikely that there are exploits to bypass every layer simultaneously (Note for the pendants; I said “unlikely”, not “impossible”. No defence is perfect).