Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I mean the same thing can be said about the USA, also if there are that many problems why don't you just check the code, it's one of the main strengths of open source software.
The USA isn't nearly as bad as China. I can access or create any news source for example. You also don't see people posting about GNU being compromised by the NSA.
Its always good to verify though.
Yeah you are right on that but there still are many backdoors on plenty of applications that are made by American companies. We also know that some agencies wanted to put backdoors on linux kernel etc. In that case why would you not trust an open source app, and trust a closed source one just because of the nationality of developers
The problem is that China is very bad about backdoors. Free software and transparency is really the only answer to not having backdoors.
As an example China put backdoors in some Chips though Huawei https://www.wired.com/story/huawei-backdoors-us-crypto-ag/
My concern is that the people behind Rustdesk are kind of a mystery. Many projects with have a publicly known dev where you can track the origin and current developments behind a project. Rustdesk just has a user called "rustdesk" for the most part. The people behind that are not known. What complicates the matter is reports of them removing issues that question the integrity of the code authors. It would make me much happier if they ran a security audit on Rustdesk. Hopefully as it gets more popular someone will either find that it is mostly fine or that it is a security nightmare.
I use it because there aren't a lot of options. Maybe someone else will create something more transparent.