Thanks for that! I have struggled with watchtower from time to time, so knowing there is a good fork out there is great. I’ll try it out.
- 0 Posts
- 14 Comments
NAS, Jellyfin/Plex, Copyparty (Google Drive replacement), Kiwix (Wikipedia), Joplin, Searxng, Ollama (LLM). Plus all the various searching tools, the maintenance tools, etc. I have pretty strong compartmentalization of my storage into separate media pools that all have their own RAID setups, plus an external backup.
It’s a bit of work to get all set up, but I use docker compose and autoheal / watchtower to keep the services going. I use Caddy and my own domain to make the services I want available externally to my network.
Because, see, they look like boy scouts. And their motto is “be prepared.”
NedRyerson@lemmy.mlto
Technology@lemmy.world•I Tested PerfectEssayWriterAI for a Week in October—impressed!English
5·2 months agoNobody wants to read your spam ads
NedRyerson@lemmy.mlto
Technology@lemmy.ml•I didn't say a single lie, yet I was banned one after another, forced to hide only by AI's side.
2·3 months agoWhat did I just read here?
NedRyerson@lemmy.mlto
Technology@lemmy.world•The Browser Wasn’t Enough, Google Wants To Control All Your SoftwareEnglish
1·3 months agoI’ve heard that someone is working on one, so fingers crossed it comes out soonish. It’s fine for me as is, but it’s a little difficult to promote to people used to the simplied Google and Apple UIs
NedRyerson@lemmy.mlto
Technology@lemmy.world•The Browser Wasn’t Enough, Google Wants To Control All Your SoftwareEnglish
6·3 months agoThe UI is a little crazy but I am a big fan of copyparty. I have moved my entire family off of Google Drive and we use copyparty, and it works great. Uploads are fast, lots of features, easy to stand up and doesn’t consume lots of resources. But like I said, the UI could be better.
NedRyerson@lemmy.mlto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Introducing a new open-source shadow library!English
16·7 months agoI can appreciate your concern and point of view, but I asked “so if I want to do this, how can I prepare to do it safely?” And your response was “just don’t, do this instead.” I can certainly seed, but that’s not what I’m aiming for. I am far more interested in creating systems and providing content. My time is…flexible. Suffice to say, the time concern is not going to be the roadblock.
NedRyerson@lemmy.mlto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Introducing a new open-source shadow library!English
19·7 months agoI’d be more than a little interested to be pointed towards a guide, or even just a bullet point list, of good opsec considerations or tools for a project like this. I’ve got time and technical ability but don’t spend a lot of time thinking about these concerns. The last thing I want is to cause myself trouble I’m not ready for, but I’d like to make a significant contribution to the community, so I want to prepare adequately.
Any guides or lists you can think of?
Stupid Ea-Nasir and his substandard copper
I haven’t listened to that. Is that sourced / verified, or just suspected?
Isn’t Vitalik a billionaire though?
Got to do it. https://c.tenor.com/rlyqxiRiunEAAAAC/tenor.gif




Somewhat. They can certainly maintain a list of known IP addresses. Those IPs can be changed.
When they change, you as a user need to be able to find the new addresses. Whatever mechanism you can use, your ISP can likely disrupt too. For instance, they can DNS block the API that returns the list of possible endpoints (as sometimes happens to Proton where I live).
You can then counter by using private DNS. It’s a cat and mouse game.