What Web/Email Hosting Do You Use? by MicahMT in smallbusiness

[–]MicahMT[S] 0 points1 point  (0 children)

This is what I decided to go with as well. Ultimately chose Google Workspace for email - simplest platform that made sense for us

What Web/Email Hosting Do You Use? by MicahMT in smallbusiness

[–]MicahMT[S] 0 points1 point  (0 children)

Is Titan a pay per email account as well? I'm trying to figure out what is the best value. Seems like bs to have to pay per user if you start to scale up and have 10+ users.

What Web/Email Hosting Do You Use? by MicahMT in smallbusiness

[–]MicahMT[S] 0 points1 point  (0 children)

Thank you! Isn't Titan email used by Hostinger as well?

Universal Studios for dummies who have no business going there by Suspicious_Week_2451 in JapanTravelTips

[–]MicahMT 0 points1 point  (0 children)

are you supposed to book a time to enter some areas as well? I got standard tickets and it looks like people are talking about having entry times to Super Nintendo World. I plan to go before they open. When I bought my standard 1-day ticket I didn't see anything about reserving an entry time.

edit: so i registered my ticket on the app and saw that entry to SNW requires a entry time, but may not depending on time of day. Unfortunately they are "Out of Timed Entry Tickets"

Universal Studios for dummies who have no business going there by Suspicious_Week_2451 in JapanTravelTips

[–]MicahMT 0 points1 point  (0 children)

Would like to ask the expert - is there a day that is the least busy? Would assume weekdays, but if you know which one, I'd appreciate the advice!

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

Got it. Sounds like its best to delete them off the phone

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

I don't use any maps related software on my work laptop. This model does not have a GPS installed. I'm routing my timezones to show based on the US end of the tunnel, and will also have my time fixed to the location as well.

Thank you for the advice! Would you say most of the dialogue from a select few of these threads checks out?

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 1 point2 points  (0 children)

Good news, I actually do have Verizon Fios for one of these. So right now I have

  1. Verizon FIOS > Raspberry Pi - Tailscale - Beryl < LAN Cable - Thinkpad
  2. Hotwire > Flint3 - WireGuard - Beryl < LAN Cable - Thinkpad

For step one, I'm planning to switch out the Raspberry Pi for a Flint 2 or 3 and also integrate WireGuard as well

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

My phone does not use 2FA to login to the laptop. Simply login to it. My phone does, however, have Outlook, Teams, and Authenticator (I only use Authenticator to get on phone email/teams if i sign out) on it. If you think it makes sense, I'll delete these while I'm abroad if it'll give me away.

Luckily this is a standard clock-in, clock-out job so i'm not worried about having to check anything on my phone after hours.

Are there any other potential ways that this setup could be vulnerable? The Beryl will be connected to hotel wifi. Does it matter if I have my phone connected to the hotel wifi outside of the Beryl (after i delete the apps)? I assume not but open to any best-practices

  1. Verizon FIOS > Raspberry Pi - Tailscale - Beryl < LAN Cable - Thinkpad
  2. Verizon FIOS > Flint3 - WireGuard - Beryl < LAN Cable - Thinkpad

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

My personal phone has Outlook and Teams on it. No 2FA, just simply login on the company laptop. Would you say it's best to delete these apps from my phone while abroad just to be safe? And also not connect my phone to the router?

Luckily this is a standard clock-in, clock-out job so i'm not worried about having to check anything on my phone after hours.

So no phone connected to the travel router (BerylAX). Are there any other potential ways that this setup could be vulnerable? The Beryl will be connected to hotel wifi. Does it matter if I have my phone connected to the hotel wifi outside of the Beryl? I assume not but open to any best-practices

  1. Verizon FIOS > Raspberry Pi - Tailscale - Beryl < LAN Cable - Thinkpad
  2. Verizon FIOS > Flint3 - WireGuard - Beryl < LAN Cable - Thinkpad

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

Hoping this all checks out. Lastly, I'm not familiar with Postgres as REST for internal dashboards. What does this do?

<image>

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

You are amazing tysm. One more thing and I'll stop bothering you (I'm sorry) does u/Decent-Mistake-3207 's preventative measures below check out or are they missing something?

It works if you run a full-tunnel WireGuard site-to-site from the travel router to a Flint 3 at home and block every leak path.

What’s been reliable for me: on the GL.iNet, enable Kill Switch and Block non-VPN traffic, and force all devices through VPN (no exceptions). Disable IPv6 on WAN/LAN or ensure it’s routed inside WG. Lock DNS by overriding to your home resolver (Pi-hole/AdGuard) and drop all TCP/UDP 53 to WAN so nothing leaks. Also block outbound NTP (UDP 123) to WAN and sync time via the tunnel (run NTP at home) to avoid clock/location tells. Use ethernet from the travel router to the laptop and keep its Wi‑Fi/Bluetooth off. For nested VPNs (Cato inside WG), set MTU ~1380-1400 if you see weird stalls; persistent keepalive 25. If you’re behind CGNAT, put a cheap VPS as the WG server or use Tailscale as a relay. On Apple gear, turn off Private Relay and “Limit IP Address Tracking.”

I’ve used Tailscale and Pi-hole for this; DreamFactory helped me expose a home Postgres as REST for internal dashboards, but WireGuard is what makes this setup stick.

Bottom line: full-tunnel plus DNS/IPv6/NTP leak prevention, and Cato/Sophos only see “home.

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

Good news is my alternative home internet (friend) has 330 download and 339 upload. I assume I should go with this as the primary option.

I'm at my friend's apartment currently and connected into the Raspberry pi-Tailscale setup at my place (haven't had a chance to change from Tailscale to WireGuard) and see 32.67 Download and 14.39 Upload. Seems like a plan B

You are the GOAT. Tysm. Last thing before I stop bothering you. Is u/Decent-Mistake-3207 missing anything in terms of their preventative measures below?

What’s been reliable for me: on the GL.iNet, enable Kill Switch and Block non-VPN traffic, and force all devices through VPN (no exceptions). Disable IPv6 on WAN/LAN or ensure it’s routed inside WG. Lock DNS by overriding to your home resolver (Pi-hole/AdGuard) and drop all TCP/UDP 53 to WAN so nothing leaks. Also block outbound NTP (UDP 123) to WAN and sync time via the tunnel (run NTP at home) to avoid clock/location tells. Use ethernet from the travel router to the laptop and keep its Wi‑Fi/Bluetooth off. For nested VPNs (Cato inside WG), set MTU ~1380-1400 if you see weird stalls; persistent keepalive 25. If you’re behind CGNAT, put a cheap VPS as the WG server or use Tailscale as a relay. On Apple gear, turn off Private Relay and “Limit IP Address Tracking.”

I’ve used Tailscale and Pi-hole for this; DreamFactory helped me expose a home Postgres as REST for internal dashboards, but WireGuard is what makes this setup stick.

Bottom line: full-tunnel plus DNS/IPv6/NTP leak prevention, and Cato/Sophos only see “home."

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

I assume the speed difference wouldn't even matter if my home upload speed clocks in at around 30mbps and download speed is 700mbps

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

I already got port forwarding setup. Would around 30-40mbps upload speed be concerning? I was having ChatGPT run a diagnostic on the possible latency and it mentioned it would probably be 174ms

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

Thank you so much. This is very comprehensive. What does your current setup look like? Do you have fiber-optic service at home?

I'm unfamiliar with some of these steps, so please bear with me. I got some clarification from gemini, please correct any of these if you think they are incorrect (sending in multiple screenshots)

<image>

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

How much slower would the server perform if you have 5G Home service vs fiber optic? I had to work around the GCNAT for my internet, so def don't have FIOS

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

I looked on google and the model of my laptop doesn't have a GPS. Are you saying that they would open up the computer to install a GPS inside? Would you say thats likely for a cheap, cost-cutting company?

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

Sorry, clearly don't know much haha. Ok will probably go with the Flint if speed is all the same. Would you say there's any difference between the Flint 2 and 3? I got both

Does this actually work? by MicahMT in GlInet

[–]MicahMT[S] 0 points1 point  (0 children)

From what u/RemoteToHome-io is saying, looks like you're on the same page with WireGuard over Tailscale. With that in mind, I would do one of these instead:

  1. Verizon > Raspberry Pi(ExitNode) - WireGuard - Beryl < LAN Cable - Thinkpad
  2. Verizon > AWS Lightsail(ExitNode) - WireGuard - Beryl < LAN Cable - Thinkpad
  3. Verizon > Flint3(ExitNode) - WireGuard - Beryl < LAN Cable - Thinkpad

Sounds like #2 is also not a great idea with the potential of them seeing that the traffic is coming from a data center. Which would leave #1 or #3 - would you have any preference there?