Sheeesssshhhhhh

joined 11 months ago
[–] [email protected] 1 points 11 months ago

Ahhh, got it. I think implementing DMZs and having additional hardware to run my services seems to be the safest option. But yea, thanks alot!

[–] [email protected] 1 points 11 months ago

But ya, i mentioned in the other comment that I placed an order this morning.

After a light research on the comparison, I guess I will cancel the order for it. Is there any particular model that you recommend for several dockerized golang apps?

[–] [email protected] 1 points 11 months ago

Ahhh, thanks. Will give this a go to test my api.

[–] [email protected] 1 points 11 months ago (5 children)

My APIs require just a simple api key to be placed in a json header to make a request.

It is just some personal android apps connected to these APIs to interact with certain databases. While there's no sensitive data involved, I am more concerned about specifically, if there's a possibility that an attacker could use this to gain access to my personal computer or other devices connected to my home network.

Should I create a sub network and get a raspberry pi to host these apps?

 

Hello guys, I'm have little to no experience when i have to deal with networking or cybersecurity.

I recently created a backend RESTful API on my Ubuntu VM on my personal desktop and dockerized the app, connecting it to a bridge network named 'tunnel.' I also have the Cloudflare Docker hosted in the same 'tunnel' network, which allows my local RESTful API Docker to be accessible via my domain and exposed to the internet.

Can anyone help me understand if this setup poses any security risks to my home network?

If so, what should I do to help reduce the risk? I have read that firewall helps, but does a restful api container developed with golang requires it?