Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I don't get it, how to other clients connect and do they use the same program? It does look cool though the tmux keyboard is bare bones.
Use unexpected keyboard, nobody expects the unexpected keyboard!
The install script contains all the pieces needed to be the host server or just a client. Because termux allows you to run multiple sessions, if you are the host, you have to run the server in one session and then connect in a different session.
What's not shown in the screen shot is that if you choose to host, a onion address is generated. This is how other clients connect.
I did see some onion code in the script, but didn't figure out that it was listening on an onion port. Cool. I'm not sure of the attraction of running it on a phone, but I'll take your word for it ;). Do you actually use it? Yeah I can see wanting to reorganize it in some ways, and maybe try to use some more standard protocols (irc?) or a subset. Does tor not already provide its own crypto?
Yeah, tor is already encrypting between each node and since both clients are connecting to the rendezvous point inside of the Tor network it should already theoretically be encrypted E2E... The other crypto is just in case that's not true... why not add other layers of encryption if you can.
No I don't use it it's kinda just a lil hobby. Nice to know I can depoly worldwide anonymous coms from my pocket though.
I have better more usable methods