Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Depending on provider and intended purpose… strictly speaking, a DNS server tells your computer that
example.com
resolves to169.254.169.254
and nothing more.However, for example, if your DNS provider adds ad blocking, they may choose to change
ads.example.com
from169.254.169.254
to127.0.0.1
thereby preventing any advertiser JavaScripts from being requested. This is fine and all, but you’d have no way to be automatically alerted if they changed it to123.234.123.234
and serve their own blank scripts.If for example your DNS provider provides region bypass for streaming providers, they could resolve
streaming.example.com
from169.254.169.254
to a server in another country with address123.234.123.234
; and route your request through that in order to circumvent the region lock.These are all fine and well, but if the provider was compromised and/or sold to malicious actor, they could resolve
your-bank.website
to a phishing site, and then MITM all the traffic just like the region lock bypass example.So… in theory, it shouldn’t do anything more than resolving, but in practice, it may be hard to detect, and they could be doing more than just resolving.