

deleted by creator


deleted by creator


deleted by creator


As an unrelated question, why do you use Andi instead of other privacy centric AI such as Duck.ai, Lumo, Brave AI, etc? I’m not familiar with Andi so I’m curious.


deleted by creator


deleted by creator


deleted by creator


My server is only available on my LAN and via a VPN. Is fail2ban applicable? Or is it mainly for public facing servers?


I view podman as a mostly drop in replacement for docker but it doesn’t have a daemon (for better and worse). I wouldn’t recommend using podman for you right now. I’d strongly recommend docker-compose (not docker run).
If you’re ever stuck trying to convert a docker run command to a compose.yml file, composerize.com is helpful.


I have about 20 services on my machine so I’m going to need to open a ton of ports (ssh, SSL, multiple higher number ports since some services require several ports). At that point, what is the point of a firewall if so many ports are open? With so many ports open, it seems like a firewall doesn’t add much security vs the complexity it adds.


I had a similar journey and recommend it. I started with Open Media Vault with docker containers configured via a GUI, then to Debian + docker compose, then to Debian deployed with Ansible + docker compose, and now I’m with NixOS + podman compose. The first jump to Debian was the most intimidating for me learning CLI commands for the first time and not having defaults chosen for me, but it was liberating to finally learn the actual tools and not just learn a GUI abstraction for tools.


I’ve seen some interesting development with Music Assistant but I haven’t personally used it. It’s not sure if it can be commanded using the cast button.
I agree with starting with what you have to get learning, but I wouldn’t run a Minecraft server on this machine. I’d start with everything else and then buy an old office machine to upgrade. It depends on the unit, but they are easy to upgrade basic upgrades like adding RAM, storage, and possibly a low power graphics card. Since most servers are always on, keep an eye on power consumption with a power meter.


Most carriers know your name, your internet usage metadata, and your location all the time using cell tower triangulation. There have been multiple reports of phone providers selling location data and sercurity breaches. If you have a phone that provides MAC address randomization and you use a VPN then I think using public WiFi is more private than having your mobile data turned on all the time.


deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator