Yeah seems like they mix up homelabbing and selfhosting a lot
emhl
Using traefik as your first reverse proxy might be a bit daunting. Caddy or "nginx reverse proxy" are much easier to configure.
They're still visible with the current xmanager version
If you want to use OpenSUSE leap as your OS autoyast is made for that: automatic installation and configuration of new systems without (or with minimal) attendence
Or you could write an bash script that makes all those configurations and just run it after finishing the Install.
An ansible playbook would be another option to do these configurations semi-automatically
There's a yuzu helper package on the aur that automatically downloads them
You need to register an account on their demo page (this account gets automatically deleted after a while). And then you can create deployments, that can be embedded into other forms
You could use something like mCaptcha, which isn't really a captcha (because it doesn't do a Turing test), but fills the same use case, by providing users with a proof of work challenge, which rate limits them like a captcha would
Are you already using something like ventoy, or do you refrain from using another usb stick?
- The entry node doesn't know what data is being transmitted (or from where that data is) only who it's being transmitted to.
- The middle nodes know nothing about the data and just know the previous and next hop.
- The exit node knows what data is being accessed (if it's not being accessed via Https) but not who is accessing it
So in other words: no, you're not transmitting unencrypted data
Snowflakes are used as entry nodes, not as exit nodes. So if your Vps provider doesn't forbid running tor services you should not face any downsides
I think scaled Sort fixes most of those issues