![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
If you are behind CGNAT and use some tunnel (Wireguard, Tailscale, etc.) to access your services which are running on Docker containers, the attack vector is almost not existing.
If you are behind CGNAT and use some tunnel (Wireguard, Tailscale, etc.) to access your services which are running on Docker containers, the attack vector is almost not existing.
Do you really need multiple VMs, can’t you run all at one? The easiest would be to install some windows/Linux on a single machine. Then stream your games with Sunshine/Moonshine and connect over RDP/VPN?
https://github.com/awesome-selfhosted/awesome-selfhosted - just pick one or more services from the list and start looking into their documentation.
YouTube and the web are full of information and guides how you can do it. Me personally I would suggest you to use Docker container and Docker compose if possible. You can see how you can install Docker or Podman to run the containers.
I am very much interested
That’s why I also switched to Obsidian. Used it for a while, but the inability to port it to another app turned me off.
You mean OpenTofu, right?
Have you tried https://shadowsocks.org/? I don’t have any experience with it, but heard it is good at masquerading your traffic and making it almost impossible for your ISP to block it
The reality is that you won’t learn much just by reading, you need to try to debug stuff and eventually work in the area to truly learn.
But I am sure there are plenty of tutorials and video courses in various platforms where you can learn a bit on the topic. Coursera might be a good place to start as you can enroll for free to those courses if I am not wrong.
https://www.baeldung.com/linux/network-speed-testing try some of the options offered here.
You can also try rsync/rclone too and see how they perform.
SCP encrypts your traffic before sending it, so it might be CPU/RAM bottleneck. You can try with different cypher or different compression levels, which are defined in your .ssh/config
file.
Sorry in that case I would recommend you do iperf and see what the traffic would be. Make sure you whitelist the traffic as well.
Try to execute
ping -c 1000 1.1.1.1
And check for any packet loss and jitter.
Additionally I would also recommend trying a different test server and comparing the results.
Keep in mind that your ISP might also have issues with the connectivity which can be fixed in the following days.
If you ask me, Unraid went the Plex way, enshittification ensues.
CloudFlare
You should also consider the time you will spend configuring and setting up everything in Incus.
If you do this with educational purpose go for it, otherwise I will advise you not to, as Proxmox has a wider support and probably finding information, etc. for it is going to be easier.
Alternatively, why don’t you dedicate one of the hosts to Incus and play around with it and decide if it works for you or not.
The most concerning part about Rustdesk is that they delete issues that question the source of the software or Rustdesk’s potential to be influenced by the CPP.
Seriously, if you make the effort to create a big piece of software and then you open source it and then someone opens a ticket in GitHub asking you those questions, how would you feel?
Because neither “what is the source of the software” nor “potential influence by the CPP” has anything to do with the software itself.
You are free to conduct a security audit of the project and based on the results you can open this thread but saying that they have deleted issues opened on their GitHub page that have nothing to do with the software itself is a pure form of witch hunt and I am genuinely surprised how many people have agreed with you.
https://www.reuters.com/article/idUSKBN27D1DO/
Damn, if only the US government didn’t have a proven track record of putting backdoors in commercial software.
But hey, at least they are not authoritarian state so backdoors originating from the US are all fine, right?
I can only feel sorry for you and would strongly recommend you to seek some specialised help.
I am not Chinese, I am born and raised in the EU and I am Caucasian.
I am just irritated that FOSS software is being questioned just because it might have been developed by Chinese programmers.
And for the record you can’t be sure that any commercial software isn’t compromised or it doesn’t have backdoors, it just makes detecting those backdoors a lot harder.
Just changing the SSH port to non standard port would greatly reduce that risk. Disable root login and password login, use VLANs and containers whenever possible, update your services regularly and you will be mostly fine