• 1 Post
  • 107 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle












  • During WWII the United States government rounded up tens of thousands of people, including many US citizens, and put them in internment camps because they looked sort of similar to the people who bombed pearl harbor. Why? Because fear is a powerful drug and when people are afraid, logic tends to go out the window, if there was any logic to begin with. If you pay attention to conservative rhetoric, you’ll notice that much of it is intended to stoke fear, while inserting themselves as the solution. They do it because it works.

    Way out in the Arkansas Delta, in a soybean field 50 miles from anywhere, there is a memorial where one of these internment camps stood. If you aren’t looking for it, you’d probably drive right by it unnoticed. All around the camp there are these little voice boxes that you push a button on and it explains what you’re looking at. The voice providing the narration is none other than George Takei who was held there with his family as a child. Spend a little time at a place like this and it will quickly disabuse you of the notion that America has always rejected fanaticism.






  • Oh, I wouldn’t if I could avoid it. The “fun” of tinkering with IT stuff in my very limited spare time vaporized many years ago. If I could pay for services that did exactly what I wanted, respected my privacy, and valued my business while charging a fair price, I would stop self-hosting tomorrow. But that’s not usually how it works.

    Self hosting isn’t super high maintenance once you get everything set up but it still takes up probably 10-12 hours per month on average and I would not mind having that time back.


  • This is a pretty good summary. In enterprise networking, it’s common to have the ‘DMZ’, the network for servers exposed to the internet, firewalled off from the rest of the system.

    If you have a webserver, you would need two sets of ports open, often on two separate firewalls. On the WAN firewall, you would open ports 80/443 pointing to the webserver. On the system firewall, between the DMZ and LAN, you would open specific ports between the webserver and whatever internal resources it needs; a database server for example.

    This helps limit the damage if a malicious actor hacks into your webserver by making sure they don’t also have unrestricted access to other parts of your system. It’s called a layered security approach.

    However, someone self hosting may not have the expertise or even the hardware to set up their system like this. A VPS for public facing services, as long as it’s configured properly, can be a good alternative. It also helps if you have a dynamic WAN IP address and/or are behind CG-NAT.

    Edit: maybe good to mention that securing your local network behind a VPN, even one hosted on your local network, is more secure than allowing public facing services. Yes, it means you still have to open a port. But that’s useless to a malicious actor without the encryption keys. Whereas, if you have a webserver exposed publicly, malicious actors already have some level of access to your system. More than they would if that service didn’t exist anyway. That’s not inherently bad. It comes with the territory when you’re hosting public services. It is more more risky though. And, if the exposed server is compromised, it can potentially open up the rest of your system to compromise as well. Like the original commenter said, it’s about managing risk and different network configurations have different levels of risk.