this post was submitted on 19 Oct 2023
2 points (100.0% liked)
Self-Hosted Main
511 readers
1 users here now
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
For Example
- Service: Dropbox - Alternative: Nextcloud
- Service: Google Reader - Alternative: Tiny Tiny RSS
- Service: Blogger - Alternative: WordPress
We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.
Useful Lists
- Awesome-Selfhosted List of Software
- Awesome-Sysadmin List of Software
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Nothing will stop a general scan from happening. Especially if it’s a slow scan.
Scans won’t trigger dos/ddos alerts.
Well yeah, that would get your host IP...if they're doing a general scan of whole ISP IP ranges (Which nothing could really stop, except for a good firewall). But there is much more low-hanging fruit for hackers than to scan tens of thousands of unoccupied subnets.
Ilulz. Automated scans cost nothing in resources. That would not find a host IP, it’d find the public Ip and open port.
I would consider time a pretty major resource....and yes, you are correct I misspoke/typed. I meant public IP, not host IP...
Anyway, the point is not to prevent all attack vectors (which is impossible, unless you're totally offline/air-gapped/etc), OP wants to minimize the probability of infiltration. So to get back to the question, yes CF tunnels help with that when implemented correctly.