A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.
Rules:
Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.
No spam posting.
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.
Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
No trolling.
Resources:
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
Here is an alternative Piped link(s):
https://piped.video/watch?v=npg3cBJusnA
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source; check me out at GitHub.
Be very careful about the exit node. You may be involved with law enforcement. Your computer equipment may be confiscated.
There’s some great testimonies from exit node operators out there. Basically it’s only a matter of time before some form of police knock on your door and ask questions but depending on your jurisdiction you won’t be liable for the traffic.
Your IP will be added to most spam block lists which (unjustly) adds the master list of exit nodes so do not use your home internet connection to host an exit node.
I ran one for a while. In Finland legislation is a bit different, so I wasn’t worried about breaking the law or getting sued, but my ISP got in touch pretty quickly. They were professionals and understood the situation when I explained why my traffic might look “a bit” suspicious and I attempted to clean up bad actors from the traffic with filtering and whatnot, but eventually ISP got enough complaints and they were pretty much forced to tell me that either I shut the exit node down or they’ll cut my line.
As I said, they were very professional about it, and managed the whole experiment as good as I ever could have hoped, but my agreement with them has an option that if I’m letting malware and bad actors leave the network even after warnings they can shut the connection down. And that’s understandable, I suppose they have similar agreements with other providers and they received all the abuse mail my exit node was causing, so I’m still a happy customer with them even if they eventually took the hard way.
I’m still pretty sure it would be possible to run filtered exit node, but it would require far more time and other resources that I’m willing to spend on a project like that and I’m not sure if a single person is enough for it anyways.
So, yes, do your homework and be careful. Legislation plays a significant part (depending on where you live), but your ISP most likely won’t like it either.
Yep, people here love to talk about the anonymity of the internet and privacy first… which is great… but with exit nodes you aren’t just hiding what you do privately. You’re hosting what everyone does privately. Take what you do, an average person, then think about all the crazy shit other people do on the internet. Going through your ISP. Attached to your name.