Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
One solution would be sending email requesting for them to open ports for you, you can tell them that you need open ports for security cameras and use that port for reverse proxy. That way you dont need more than one open port. Second option is cloudflare tunnels, they do not require open ports at all, but they do require for you to buy domain though. Last option would be to use VPN like tailscale which also do not require open ports at all. All you need is clients installed on devices and connect them on the same network.
Hope some of these help, i actually use all methods for different situations and each of them have pros and cons, but those are all reliable methods.
The better way to go about it is using Cloudflare tunnels or Tailscale.
Tailscale will walk right past those ISP restrictions like a ghost passing through a wall.
The only way it would not would be if the ISP only allowed TCP ports 80, 143, 443, 465, 587, 993, and 995. Many public hotspots in my area do this plus deep packet inspection. You would need OpenVPN or SSH for a TCP-based VPN and then a means to disguise your traffic to look like an https session, over say, port 443. It's not easy to defeat but very doable.