pastelstocking

joined 1 year ago
[–] pastelstocking@alien.top 1 points 1 year ago

tunnels are reverse-portforwarding. ports aren't open on my network but on theirs.

anyways i moved back on VPS because im not 100% sure what is my ISPs stance lmao. and since i cant have much control with my internal network for now, id rather stay away but i def wanna host at home eventually

[–] pastelstocking@alien.top 1 points 1 year ago (1 children)

no auth as personal blog is supposed to be public and accessible to everyone.

however, until i can have more control of my internal network, i moved back to a vps :)

[–] pastelstocking@alien.top 1 points 1 year ago (1 children)

Tbh.. It's just nginx and gunicorn and yeah i keep it updated :)

[–] pastelstocking@alien.top 1 points 1 year ago (9 children)

Everything has some sort of vulnerability, the qestion is will someone be assed to abuse it.(rheotical question)

 

I’ve migrated from cloudflare pages to cloudflare tunnels as I wanted to do a little bit more.

I can’t segregate my network as my ISPs router is rather limited, which means no vLANs. Connecting another router would introduce a double nat as they don't allow bridging. So I'm running my website basically "raw" in a hyperV virtual machine. the website is semi-static and made out of flatfiles, therefore it's is quite impossible to login into it. as stated before i’m using cloudflare tunnels to expose a nginx server to the interner. what are the chances someone or something (bot) inflataring my network? 100% safety is not possible but how safe am i?