this post was submitted on 02 Sep 2023
51 points (98.1% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54539 readers
320 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Just making sure I'm not missing something obvious:

Self-hosted Linux VM with protonVPN and QBitorrent installed on it.

QBittorrent networking bound only to ProtonVPN's virtual interface with killswitch and secure core enabled.

Auto updates enabled and a scripted alert system if ProtonVPN dies. Obviously everything with very secure unique passwords.

Is this a safe setup to run 24/7 to torrent and seed with?

Are there any significant risks I'm missing? Thanks, fellow sea salts!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (1 children)

Full disk encryption? Or should I do something additional?

[–] [email protected] 1 points 1 year ago

file or disk encryption is only for protecting against attackers with physical access to the machine your VM is running on. Getting files from your server to local storage you should still use a secure connection and encrypted traffic to prevent ISP snooping, but going extreme on file encryption isn't necessary unless you're downloading actual heinous shit (CSAM) in which case you should go to jail.