Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
They don't need to see the traffic inside the VPN. They only need to see that there's a VPN at all.
I get that - I was just confused at your "torrents would be detected" comment. I understand using a VPN would be visible and may be against whatever TOS they have.
Yeah, torrents without a VPN will be detected. Torrents inside a VPN won't be detected, but the VPN itself will.
What if VPN traffic is on a non-standard port?
It's still VPN traffic and will be detected as such.
Not really, if it's on TCP 443 it will look no different than a typical HTTPS traffic.
That's where you're wrong, bucko. A true tunnel over HTTPS, yes, but if you use IPSec on 443 it will still look like IPSec.
And if the org requires a CA cert or agent installation as part of their AUP, they can decrypt the HTTPS tunnel and see it as a VPN.