You can’t have a Lemmy wide rule for anything because that’s not how federation works.
You can’t have a Lemmy wide rule for anything because that’s not how federation works.
We’ve got it too but we pronounce it right.
Glad I host my own instance so I get to choose what I get to see.
Almost Heaven.
Fuck the context I wanna be MAD!
Like the kid asking if there’s any homework tonight 😆
Speedrunning the debian download process. You should post that time.
Oh this is interesting. Yours is shortened too.
I host my own instance and it’s just me (because I’m so unlikable I can’t even get my 2 FRIENDS to join my instance. I digress)
I wonder if there’s some setting or ENV variable somewhere on the instance to change that.
As far as I can tell the full username is only hidden on the same instance. So for instance, I see your full user name, but I only see the shortname for mine.
This is disgraceful thank you for marking it nsfw.
This. This shit right here man. I love it.
Well in that case, tailscale is running as a daemon, so it effectively is doing it’s own little Dynamic DNS.
I suppose the point I’m trying to make is SOMEONE has to know your public Home IP. In the case of using tailscale, it would be the tailscale servers. But you would be correct that I don’t believe it would be published to any public DNS servers.
In my case, I’m using cloudflare for DDNS.
The solution I describe comes with a bit of risk acceptance (just like anything else really).
Well the VPN connection depending on what technology you use will still need to connect to the Public home IP, which is probably dynamic, which means that you’d probably need to use Dyanmic DNS to keep it connecting properly.
As far as someone just connecting to the reverse proxy the Home IP shouldn’t be visible at all. I just mean it wouldn’t hide well were someone really trying to find it.
I’m not sure I’m explaining this well. I haven’t had coffee yet.
It’s not a perfect solution but, and requires some sort of VPS, but you could run a reverse proxy on a VPS, site-to-site vpn from the VPS to your Homelab, and point your reverse proxy to the services over said VPN.
I do something like this. However, it doesn’t completely hide your IP.
So the software you’re looking for is a Reverse Proxy (nginx, traefik, caddy… etc. there are tons), a VPN (Wireguard, OpenVPN, StrongSwan (IPsec)), and more than likely some sort of VPS. My Linode VPS costs me $5 a month. They constantly have sponsor deals that will get new users free time though.
Hope that gets you started.
Since I’m hosting my own, I have it set to subscribed, which is not much different than “All” for me.
It takes a little getting used to but I’m liking it more and more. Even with it’s quirks.
Hmm weird. The server is supposed to notify me of a pending join request.
I’ll look at it tomorrow.
I don’t have it set to private because when I tried that before it seems to break federation entirely. I do however have to approve anyone who wants to join. At this point I’d probably allow my close friends to join if they wanted, but that’s about it.
Mostly because I am nearly 100% positive I will either lose my ZFS array, try to move the server to different hardware and bork psql, or what have you…
My homelab is mostly duck tape and bubblegum.
Use the eagles? You don’t just USE the Eagles. They are intelligent beings. They don’t submit to the will of anyone. They kindly risked their lives toward the end, and only because things had escalated already.