It’s huge for networking. VPN gateway (for accessing the VPN WAN over LAN) on the host is 20-40% faster than dockerized…
A genuine depiction of “Plague Sapiens”: a distinct form of human evolution, entirely erased from memory until it resurfaced from the infernal depths of space.
It’s huge for networking. VPN gateway (for accessing the VPN WAN over LAN) on the host is 20-40% faster than dockerized…
This could be the I/O overhead caused by docker while using NAT networking: https://stackoverflow.com/questions/21889053/what-is-the-runtime-performance-cost-of-a-docker-container#26149994
Whats your setup? Stuff dockerized? Looks like routing/iptables are set incorrectly (depending on your setup).
But my solution would be using a local DNS VPN like personalDNSfilter, exposing your services over the VPS to the net and connecting over https to them. For local access at home you can use split-brain-dns (hope thats the correct word [example.net = 8.8.8.8, at home it resolutes to 192.168.x.y]). With that you can just walk around and use every service with the best latency and bandwidth, without manually deactivating the VPN.
This. You can create two seperate networks for the nginx instance (I would recommend NPM (nginx proxy manager)) and use one each for connecting from the lemmy instances to the reverse proxy. Traefik is nice too, that was my first rp used for docker and it integrates quite nicely to the docker environment :)
https://en.m.wikipedia.org/wiki/Tor_(network) Not NSA and no backdoor so far. It’s not needed, control enough hops and you can trace a lot and even deanonymize clients. Tor has it’s weaknesses, maybe implemented just for that. But afaik they’re mostly caused by design.
This. While being annoyed by one of my grandmothers giving me bed sheets as a birthday present when I was around 10. I now totally understand and like it. Haven’t really bought much clothes since ever, cause my mother and sister are currently fullfilling my grandmother’s task for years now xD And it’s nice to use the money I would have spent on clothes to buy me more tech stuff I really want.
I doubt that Mr Rich cares about privacy at all. Data is his biggest income.
Wise words!
That and permissions are likely the main problem, dependencies are likely the next xD
Some years ago, being a linux noob, I have created a VM to setup aBitcoin Lightning node. The blockchain is huge and my idea was to passthrough a 2 TB (/dev/sdc). Had to restart my homeserver because of some hoste settings I’ve changed. Didn’t see that sdc changed to sda and sdb (8TB fully encrpyted drive with my smb shares on it(seperate VM) to sdc. So far no problem. Because I didnt’t knew that the device names changed, I started the initilization process which formats the passthrouged HDD. Oh boy, when I heared the 8TB HDD spin up and doing it’s thing, the 2 TB HDD was still in spin-down, I panicked and shut down the server. End of story, 8 TB data was unrecoverable (lost all of my photos since I was a kid (~100k), lots of redownloadable stuff, gladly everything sensitive was backuped, like private seeds, work stuff, docuements, …) Never use /dev/sdX device paths, use UUIDs. They exist for a reason.
This is the way!
Like someone already mentioned, you can use dracut-ssh for rpm-based distros or dropbear-initramfs for deb-based distros. My idea would be to use debian as host and virtualize or dockerize the freebsd system/software part.