• 0 Posts
  • 34 Comments
Joined 2 years ago
cake
Cake day: December 11th, 2023

help-circle
  • You/users have a choise. Use privacy invasive chat apps like WhatsApp, Telegram, etc for free or invest some time and/or money to self-host it or use their SaaS option. Either way, you’re far better than using WhatsApp. Signal is a very good option.

    If you “don’t care about privacy because if have nothing to hide”, I recommend reading Means of Control by Byron Tau or just watch what ICE is doing with all the data Palantir is offering.


  • I’ve been using it for more than a year to communicate with my family and a very small group of friends. The video and audio call features are good and I’ve replaced phone calls and Signal/WhatsApp with it. Because it’s XMPP, there are many clients you can use, not just the Snikket app. Overall, I recommend it because of the End2End Encryption features and self-hostable (if that’s a term)


  • True. Maybe it was not the best phrasing. It may apply to some email providers (eg. Proton) if email communication happens only between recipients of the same provider, which is rarely the case.

    I mentioned this to highlight that if this pressure is put on legitimate secure services like GrapheneOS, then you can imagine that your email data is scrutinized without your knowledge.






  • If privacy is important for you, https://anytype.io/ has E2EE (End-to-End Encryption). You can run your sync nodes also. Personally, I’ve used Roam Research, Doom Emacs, moved to Logseq, then Obsidian, back to Logseq and now I’m using Anytype for two years.

    Edit (hit post by mistake): The encryption part was not a must for me also, but then I started using my notes in my work laptop also and I didn’t want my notes stored in plain text on a computer which is not fully controlled by me. I’m mentioning it because over time you’ll have many, many notes and the transition from one tool to the other is very time consuming.




  • I see you’ve got some downvotes, but without anyone suggesting a solution.

    You can add the mount points in the docker compose file and then configure Jellyfin to read from the path(s) mounted in the container (/media/movies)

    Eg:

    volumes: 
      # local path : path in container 
      - /mnt/storage/media/movies:/media/movies
    
    








  • There are a couple of things to cover here:

    1. Keep your software/containers up to date. You can subscribe to the GitHub repo and configure it to get notified for new releases and security alerts. Complementary, you can use RSS feeds, newteleases.io and/or WUD (What’s Up Docker) and add labels to your docker compose files. Personally, I check the notification once a week and change the version for all minor tools I’m using. If there is a major release (or new Immich version) I read the changelog and update instructions (if it’s the case).

    2. For container security scans, you can use Trivy, but the problem is that you don’t have a centralized overview of your scan results. For this you can use DefectDojo. Depending on the case/threat model, vulnerability management for self-hosted things might be overkill, but highly recommended of you want to learn more about this. It worth mentioning Trufflehog as secrets scanner and sops as a solution to encrypt sensitive data so you can push it to git/SCM.