• 0 Posts
  • 318 Comments
Joined 1 year ago
cake
Cake day: August 27th, 2023

help-circle

  • As a non-drinker of coffee, I am fully onboard with raising the price of coffee. Everyone is far too addicted to it and drink excessively to an unhealthy amount. Less coffee would be better for general health. Same for chocolate, as I saw someone else mention.

    Too bad Trump doesn’t care about that and doesn’t actually have any plan in mind for this kind of economic policy for the welfare of the people.











  • Since its main purpose is to cover your genitals, none of the above.

    If it is just to protect the legs then 2 or 3 does the job, but 2 looks impossible to create in reality unless you sew it around the spider. Maybe we are assuming the spider spins this around itself with its webs so maybe that will work.






  • So many suggestions here but I thought I’d chime in because I have a setup very similar to what you suggested and I found a very easy way of hosting it securely. I am using Unraid on a system in my house. I have my web service running in a docker container. I exposed it using a cloudflare tunnel. There is an Unraid plugin for cloudflare tunnels that takes out a lot of the configuration work involved in getting it running locally. You just have to also set up a corresponding endpoint on Cloudflare’s website and have a domain name registered with them for you to link to it.

    The way it works then is when someone requests your domain (or subdomain) in their browser, Cloudflare gets the request and redirects the traffic to the cloudflare tunnel client app that you set up in your computer. That app on your machine then redirects the traffic to your other container that is hosting your web service and established bidirectional communication that way.

    The benefits to this system are:

    • Relatively easy setup, especially if you want to expose more services in the future (you’ll need to run a separate cloudflare container for each service exposed though)
    • No need to open ports in your router or firewall on your home network. Cloudflare just knows how to communicate between its server and its client app on your computer (I think you have to set up an access token so it is secure).
    • None of your users ever learn your home IP address because once they connect at Cloudflare’s server, they don’t get any more knowledge than that about what’s on the other side.
    • It’s free (not including the cost of registering your domain)
    • You don’t have to worry about changing anything if your ISP randomly changes your IP address. Hell, you could even move to a new house and take your computer with you and you wouldn’t have to reconfigure anything.

    Downsides:

    • You have to trust that Cloudflare is not scraping all the traffic going through the tunnel.
    • Some people have a moral issue with giving Cloudflare more responsibility for hosting “the Internet”. We already rely on their infrastructure heavily for large sections of the Internet. If they ever become malicious or compromised, there is a lot to lose as a society.

    I believe you can use Wireguard and a rented VPS to recreate this setup without Cloudflare but it will require a lot more knowledge in order to set it up with more points of failure. And it would cost more because even though Wireguard is FOSS, a VPS will cost you a monthly fee of at least a few bucks per month.

    I currently have 2 services exposed using Cloudflare tunnels on my Unraid system at home. They’ve been running for over a year now with 0 interruption.