this post was submitted on 22 Oct 2023
7 points (81.8% liked)

Self-Hosted Main

504 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS
 

Hi! So I have had surfshark for a while and been generally quite satisfied. They do everything I need them to do this far with no fuss and bundle in some handy other services as well.

My annual plan expires in a couple of months and I'm curious what else is out there, as I only started SF because it was heavily discounted at the time. From a new provider, I just need privacy, the ability to torrent totally public domain content, and a static IP. Do you have any suggestions for other options worth considering? I just like to have options. Thanks in advance!

you are viewing a single comment's thread
view the rest of the comments
[–] bufandatl@alien.top 1 points 1 year ago (1 children)

True anonymity and privacy is only offline possible.

[–] PixelDu5t@alien.top 1 points 1 year ago (2 children)

If you ignored everything that was just said then yeah, sure. Wonder why Tor exists... Ah well, must be just for show.

[–] LuckyHedgehog@alien.top 1 points 1 year ago (1 children)

Tor has been used to track and arrest people before. It isn't 100% guaranteed like being offline is.

[–] PixelDu5t@alien.top 1 points 1 year ago (1 children)

That is true, but very often when people have been caught like that, it didn’t have anything to do with Tor but just poor opsec, like literally using an email with your full name which kind of makes using Tor pointless anyway. If you can link me any events where people were caught any other way than the perpetrator not exercising good opsec, I’d love to take a look.

[–] LuckyHedgehog@alien.top 1 points 1 year ago

I listen to a security researchers podcast, and they mentioned Tor exit nodes being set up by governments to figure out where messages were coming from and track down individuals

There was also this article I found where the FBI exploited a vulnerability to expose the IP of a wanted individual

https://www.technologyreview.com/2020/02/08/349016/a-dark-web-tycoon-pleads-guilty-but-how-was-he-caught/

[–] bufandatl@alien.top 1 points 1 year ago (1 children)

Keep dreaming little one. You leave traces as soon as you go online even when using Tor and supposedly no logging VPN. In a way those have to log something about you for billing reasons alone.

[–] Bonsailinse@alien.top 1 points 1 year ago

Your anonymous login data and a "paid until date X" are literally all fields that are necessary for them to have it work. And even if someone can make the connection they can only see that you are using a VPN, not what for because the company doesn’t keep logs about your activity (and besides that doesn’t even have to hand them out). But keep saying "offline is more secure". Yeah, d'uh, then please do us a favor and stay there.