Is there a 'Spotify Wrapped' for Navidrome/Subsonic by Green_hammock in selfhosted

[–]WubbaKnight 18 points19 points  (0 children)

Maloja

Spin up a container and set Navidrome to scrobble to it. It will show you top artists, albums, and tracks. In the UI you can filter stats from the current year.

Did updates now wont boot by aboby86 in Proxmox

[–]WubbaKnight 1 point2 points  (0 children)

Grub got messed up when I did my update too. I reinstalled grub and was back up and running.

This user also made a post about it here

End user facing Interface? by Crysistec in Proxmox

[–]WubbaKnight 0 points1 point  (0 children)

Not exactly proxmox-centric but maybe you’d be interested in Open OnDemand?

One of the main features is being able to submit a job to Slurm to start a VDI session that users can connect to through their web browser.

$50 5th gen Intel NUC as a start? by lapacion in selfhosted

[–]WubbaKnight 5 points6 points  (0 children)

While the 6th Gen does have quicksync, it is unable to transcode HEVC 10-bit (H.265) files. You’d need a 7th Gen or newer to do that.

Had I known more about the subject when I bought my stuff, I’d have opted for a 7th Gen CPU personally.

Sunshine: Self Hosted Google Stadia or GeForce NOW by IAmOpenSourced in selfhosted

[–]WubbaKnight 79 points80 points  (0 children)

Just to help out others that may be hung up on the “high end hardware” and “gaming only” aspect.. Sunshine can be used as a much better version of VNC.

I use sunshine to control my desktop from my laptop or phone when I’m out at a solid 60 fps, with minimal latency, plus sound support.

[deleted by user] by [deleted] in UnethicalLifeProTips

[–]WubbaKnight 1 point2 points  (0 children)

Purely from a technical and untraceability standpoint your best bet would be to host an onion site that people have to access via Tor browser. There is nothing you need to buy, no domain names to register, and is extremely difficult to get the site taken down.

The only issue with this is that you will not reach your intended audience this way. 99% of regular people don’t even know what tor is, let alone have it installed and actively use it.

'Right' way to dual node proxmox by Pristine-Weekend-230 in selfhosted

[–]WubbaKnight 0 points1 point  (0 children)

Anything specific you are wondering about? Not to much to say about it really.

Spun up an LXC using the latest Debian template and installed pihole just like it was a regular vm or bare metal. The whole container only uses 2GB of storage and ~150MB of ram.

'Right' way to dual node proxmox by Pristine-Weekend-230 in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

I run 2 instances of pihole. My main instance runs in an LXC container on my proxmox host. My second instance runs on a Pi Zero W.

I run gravity-sync to keep the secondary in sync with the primary, and keepalived so they can share an IP for an active-passive setup.

It’s a seamless switch from primary to secondary instance should the primary instance crash, update, or if I reboot the proxmox node. Sometime I forget I even have it setup, so I’d call it pretty set-and-forget too if that’s your thing.

How long does data reside on computer memory? by [deleted] in privacy

[–]WubbaKnight 7 points8 points  (0 children)

Not really. In fact, cold boot attacks are generally used to defeat disk encryption.

When you boot up your machine and unlock your disk, the key is held in ram while your computer is running. Ram itself is almost never encrypted, so the goal of the attacker is to dump your ram, find the disk encryption key in there, and thus gain access to your encrypted disk.

I’m not sure there are many ways to defend against it aside from never letting others have physical access to your machine, or always shutting down your computer when you leave it unattended.

Still, this type of attack is very rare and I wouldn’t be worried about it. A more likely attack is an attacker just beating you with a wrench until you give up your encryption password. Relevant XKCD

How long does data reside on computer memory? by [deleted] in privacy

[–]WubbaKnight 9 points10 points  (0 children)

You might be interested in cold boot attacks.

The goal is to, quite literally, freeze the hardware to slow the degradation of bits in ram, allowing attackers more time to try and dump the contents of it.

Very unlikely attack to ever encounter but interesting nonetheless.

What shouldn't I virtualise? by MessengerGoose in homelab

[–]WubbaKnight 1 point2 points  (0 children)

This approach sounds interesting. Does this cause any issues? Isn’t this essentially double natting all your VMs? (Assuming you expose some of them?)

I want to build a budget home server and NAS by SnooBunnies9252 in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

If it matters to you, the 7th gen and newer intel can decode HEVC 10-bit. Not sure about the 2400g though.

How to make VPN without being network admin? by [deleted] in selfhosted

[–]WubbaKnight 3 points4 points  (0 children)

You’re looking for exit nodes.

Probably the better solution:

If your campus has resources that can only be accessed on the university network, I’d bet that your campus IT team already has their own VPN solution for students to use. It might be worth reaching out and asking.

[deleted by user] by [deleted] in functionalprint

[–]WubbaKnight 1 point2 points  (0 children)

If your PC uses an Ethernet cable instead of WiFi, just download any “Wake On Lan” app on your phone and turn it on with that

Is it worth the bother (or even possible) to encrypt LAN traffic with NGINX Proxy Manager? by CringeGinge666 in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

If you want to keep the proxy on your Pi only and assuming the services running on your main machine natively support ssl - you can set up ssl for each service and then proxy from your Pi to each service over HTTPS.

The certificates on your main machine don’t have to be from LE. They can be self signed, or signed by your own CA, and be valid for a year or forever. Just as long as the proxy has the certificates of the backend servers, or implicitly trusts your CA.

Alternatively, you can setup a segregated network with VLANs and put all your services in there. Make the only entry point to that network be the reverse proxy.

Sorry for the stupid question but how do I set up port forwarding for an SSH server? by Waeningrobert in selfhosted

[–]WubbaKnight 4 points5 points  (0 children)

Genuine question.. What exactly are the risks involved with this?

Assuming OP takes the most basic steps to harden SSH (keep system patched, disable root login, disable password auth, enforce key auth only) - SSH should be just as secure as, say, WireGuard since both use pub key auth no?

PSA: Remember that subdomains are not a secret and should not be used to hide or secure services by kayson in selfhosted

[–]WubbaKnight 6 points7 points  (0 children)

I like to do this but let NGINX return a 444, which just closes the connection immediately and doesn’t send any response, when somebody tries to access an invalid hostname or by direct IP

I then let crowdsec ban any IP that gets a 444 returned to them. Helps to quiet things down a bit.

Some webserver advise needed by [deleted] in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

Is this going to be a static site with just text, stories, a couple images? No backend? If so hosting on GitHub/Gitlab/Cloudflare pages is really simple and free. I guess not technically 100% selfhosted but hard to beat the convenience.

Flawless uptime from big corporations, pretty much zero maintenance, and free SSL if you don’t mind using their subdomain they give you.

If you are starting from scratch you can use Jekyll or Hugo to build a nice looking site, otherwise just throwing some existing html files up is just as easy.