![](https://lemmy.villa-straylight.social/pictrs/image/57d2c5e7-68c1-4bc6-b404-5a8491a5c940.jpeg)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
2·
1 year agohttps://github.com/oxtyped/gpodder2go
Is a go implementation of gpodder that is simpler to deploy with an existing container image.
https://github.com/oxtyped/gpodder2go
Is a go implementation of gpodder that is simpler to deploy with an existing container image.
This is what I do. It is super effective.
Because I don’t want to be centralized around a single company and service. Any company can provide a vps endpoint. I can literally be set up again in a manner of minutes on another ip, vps, or vps provider.
I do the same thing, except with openvpn. I need to upgrade it to wireguard. I ended up just masquerading the traffic opnsense router, but now everything looks like it is coming from the internal openvpn ip address.
How are you identifying traffic that needs to go out the vpn, vs traffic that doesn’t, if you don’t mind sharing?
What do you mean about a specific group that targets it?