this post was submitted on 22 Oct 2023
8 points (83.3% liked)
Self-Hosted Main
504 readers
1 users here now
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
For Example
- Service: Dropbox - Alternative: Nextcloud
- Service: Google Reader - Alternative: Tiny Tiny RSS
- Service: Blogger - Alternative: WordPress
We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.
Useful Lists
- Awesome-Selfhosted List of Software
- Awesome-Sysadmin List of Software
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I do only torrent stuff that won’t warrant the authorities to come to my home. This is in the end r/selfhosted and not r/piracy where you would have more concerns. Also your name is registered to the VPN service too and believe me they will rat you out if it comes to a how down with authorities.
If you truly care about privacy, you can go for a provider that asks for no personal details (not even an email if you so desire) and allows you to pay using an anonymous payment method such as Monero. In this scenario it would be incredibly difficult for Mullvad to rat you out even if they wanted to, assuming you only used the VPN for anything but things that could trace back to you (so no logging into services with firstname.lastname@gmail.com.) True privacy and anonymity is difficult to achieve but it is possible, just requires you to pay attention.
True anonymity and privacy is only offline possible.
If you ignored everything that was just said then yeah, sure. Wonder why Tor exists... Ah well, must be just for show.
Keep dreaming little one. You leave traces as soon as you go online even when using Tor and supposedly no logging VPN. In a way those have to log something about you for billing reasons alone.
Your anonymous login data and a "paid until date X" are literally all fields that are necessary for them to have it work. And even if someone can make the connection they can only see that you are using a VPN, not what for because the company doesn’t keep logs about your activity (and besides that doesn’t even have to hand them out). But keep saying "offline is more secure". Yeah, d'uh, then please do us a favor and stay there.
Tor has been used to track and arrest people before. It isn't 100% guaranteed like being offline is.
That is true, but very often when people have been caught like that, it didn’t have anything to do with Tor but just poor opsec, like literally using an email with your full name which kind of makes using Tor pointless anyway. If you can link me any events where people were caught any other way than the perpetrator not exercising good opsec, I’d love to take a look.
I listen to a security researchers podcast, and they mentioned Tor exit nodes being set up by governments to figure out where messages were coming from and track down individuals
There was also this article I found where the FBI exploited a vulnerability to expose the IP of a wanted individual
https://www.technologyreview.com/2020/02/08/349016/a-dark-web-tycoon-pleads-guilty-but-how-was-he-caught/
The question still included this requirement, so don’t suggest solutions that are not applicable then. Good VPN providers offer to pay with various services not linked to your personal data for a reason and they don’t sit in countries like the US. Please just stop spreading information about things you clearly have no clue about.
A this is r/selfhosted and there for the solution is to self host.