Telegram is less private then whatsapp, unless you use the private chats it’s not even encrypted.
Telegram is less private then whatsapp, unless you use the private chats it’s not even encrypted.
Until now the easiest experience for me I actually had was Arch. You have to do everything yourself but i found it way easier to fix things in Arch than in any other distro I used.
I don’t think they meant vanilla Linux like vanilla OS, but more as in the vanilla versions of Linux without much on top/proprietary software.
File upload is not a chromium feature, it’s a super old basic feature. It’s just their pittiness and upcoming drm implications. I bet if you set your user-agent to chrome it woould work just fine.
Reminds me of r/spareparts. Is there something like that on here?
Oh right, yeah.
That’s already Windows 11.
deleted by creator
Yeah, same reason why disc wheels are only allowed in the back at time trials.
Some Youtube-Channels I can recommend, but with varying levels of “noob”-friedlieness. Just watch a few and decide for yourself which can help the most:
https://youtube.com/@christianlempa
https://youtube.com/@TechnoTim
https://youtube.com/@LearnLinuxTV
As for a reverse proxy, it depends how you want to access your services. If you’re just gonna host your services on docker and then publish ports on the host you can just access them that way. But that way they are of course not encrypted, which in your home LAN can be fine. To really use a reverse proxy you also need to have a way to rewrite or add dns entries in your local network. All the domains and subdomains you’d want to use must point to the reverse proxy which would then forward the requests to the services.
The way I have it configured right now is that I have a reverse proxy on my docker host which has the ports 443 and 80 published on the host, while all the services I use in docker on that host do not have published ports. They’re all then in a network with the reverse proxy so it can forward the requests to the services. That way I can encrypt everything with SSL/TLS and have trusted certificates on everything. I use nginx proxy manager which also handles my certificates.
The really vulnerable open ports are the ones you forward to your router. But you only need those when you want to access services from outside your network. But I would wait on that until you feel comfortable.
Da müsste man sich doch mal mit ein paar ausgedruckten Köpfen irgendwelcher Kirchlichen Offiziellen und etwas Kleber auf den Weg machen und die Plakate etwas an die Warheit anpassen.
Yeah, Signals response pointing to how their service works and than all the data consisting of only these two things war hilarious.
I use duplicati for docker containers. You just host it in docker and attach all the persistent volumes from the other containers to it, then you can set up backup jobs for each.