pastelstocking

joined 11 months ago
[–] pastelstocking@alien.top 1 points 11 months ago

tunnels are reverse-portforwarding. ports aren't open on my network but on theirs.

anyways i moved back on VPS because im not 100% sure what is my ISPs stance lmao. and since i cant have much control with my internal network for now, id rather stay away but i def wanna host at home eventually

[–] pastelstocking@alien.top 1 points 11 months ago (1 children)

no auth as personal blog is supposed to be public and accessible to everyone.

however, until i can have more control of my internal network, i moved back to a vps :)

[–] pastelstocking@alien.top 1 points 11 months ago (1 children)

Tbh.. It's just nginx and gunicorn and yeah i keep it updated :)

[–] pastelstocking@alien.top 1 points 11 months ago (9 children)

Everything has some sort of vulnerability, the qestion is will someone be assed to abuse it.(rheotical question)

 

I’ve migrated from cloudflare pages to cloudflare tunnels as I wanted to do a little bit more.

I can’t segregate my network as my ISPs router is rather limited, which means no vLANs. Connecting another router would introduce a double nat as they don't allow bridging. So I'm running my website basically "raw" in a hyperV virtual machine. the website is semi-static and made out of flatfiles, therefore it's is quite impossible to login into it. as stated before i’m using cloudflare tunnels to expose a nginx server to the interner. what are the chances someone or something (bot) inflataring my network? 100% safety is not possible but how safe am i?