- 1 Post
- 5 Comments
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•Reitti v3.1.0: A year of self-hosting my location history (1.1k stars and 46 releases later)English
4·3 months agoI’ve been following this since release and can only say a big thank you for how active you’ve been on this project! It’s great to see a developer take an active part in feedback and ideas and quickly being able to get them into the project. Keep going strong, and thank you!
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•Selfhosted alternatives to Discord with screensharing?English
5·4 months agoHuh, it’s been nearly flawless for me as well. Had it randomly hang once a few months ago but I think that may have been due to a lack of resources for that lxc. Other than that it’s been flawless over multiple apps: Linux, Android (element, schildichat next, fluffy), windows, web. All synced and verified.
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•introducing copyparty, the FOSS file serverEnglish
1·8 months agoAnd obviously, encrypted folders can’t be accessed through the file system even with the fuse add on, because that would break the whole point of encryption.
To me, the one big advantage Seafile has is its e2e encryption and encrypted folders, as it allows me to host it externally without allowing access to my files to the server administrator.
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•introducing copyparty, the FOSS file serverEnglish
2·8 months agoI looked at the comparison for Seafile as that’s the one I’m most familiar with. In my opinion Seafile’s greatest strength is its encryption, but in your comparison you seem to see this as a negative as I assume this bullet refers to the encryption? “isolated on-disk file hierarchy, incompatible with other software. much worse than nextcloud in that regard”
Many people talking about using subdomains, but that’s only really a thing if you actually have a domain. Just last year the domain .internal was reserved for internal use, so that’s what I’ve set up all my domains to use. E.g. https://pihole.internal/, https://proxmox.internal/.
To make this work I use pihole’s local dns records to rewrite any *.internal domain to point to my reverse proxy Caddy’s ip.
As for the certificates, I created my own CA, which I install on all my and my family’s devices. Then, for each new url I set up, I create a new certificate and sign it with my CA certificate, then have my reverse proxy serve it.
This all sounds like a lot of work, and it is, but using OPNsense for both reverse proxy and certificates makes it well integrated and certificates are trivial to renew. With that said, if you have your own domain, go the let’s encrypt subdomain route instead imo. It saves you a lot of manual labor with setting up your CA on every device you own and creating new certificates for each site.