This is what I use Foreman and Katello for. Package mirror with x versions synced automatically with all my machines subscribed. Or it would be, if I ever got around to actually setting the damn thing up. I have a debian package repo and a few things subscribed, but I'd like to add more.
mrwiggles
I think your best bet in this case is google drive. Most people have a google account, and if they don't, I believe it's possible to set it up in a way that it will let them upload anyway. I don't think you're getting out of the account requirement, outside of you setting up an anonymous ftp server in a vps or something.
OPNsense for the win! It's so powerful, I love it.
💩 -gle making piles people can step in
Lemmy by default will federate with all instances if you don't put instances in the "Allowed Instances" section. I've found, it's easier to federatte with all instances and ban the ones you don't want. Otherwise, you effectively use a whitelist to federate.
It's also worth noting that there's an upper limit on the number of communities you choose to federate with, while there doesn't seem to be an upper limit on the blocked communities
As a webmaster myself, I've noticed a small number of users with repeating seemingly generated names, all with the same or similar answer to the registration screening question. I'd be curious if you could release the database of usernames and screening question answers. I'd bet other Lemmy admins would benefit from any analysis done on that database. TTP.
I also use Jeroba, as it's in the FDroid repos. I'll look into those others you mentioned, but I'm quite happy with Jeroba so far.
There's also podman-compose, which I've been using. It's not quite feature complete, but it's pretty close.
Saving this for later, thank you very much for the detailed writeup. I might look into this for my main machine to partition the vpn tasks from the non-vpn tasks
You can also use reader clients - I use LiFeRea on linux, it's in the app repository as liferea. It;s free
And this is why you password protect your ssh keys