Thanks! Would you be able to elaborate a bit more?
It was my understanding that this is not the same thing as running an exit node.
When DMing me, remember that you have to trust both your server’s admin, as well as mine.
Please use the following age key to encrypt your message (and send me yours, so that I can reply).
age196r7j3hn9dpwsywvlch0ncrvtlx94l2kwyndj733j5vr73dy0vyqa0jgca
Thanks! Would you be able to elaborate a bit more?
It was my understanding that this is not the same thing as running an exit node.
Honestly? Probably boredom. Computer-related projects are addictive to me.
Haven’t ventured too far, but searxng was my first selfhosted service. It’s very easy, single container, no database.
Never self-hosted Lemmy, but have self-hosted other things in the past. While you don’t necessarily need to code, you need a fair amount of code-adjacent skills. If you ever want to get into self-hosting, you should have a look into (at least):
It makes sense in terms of reproducibility.
Imagine if your server gets compromised, you accidentally break it, or you just want to move to a cheaper provider or a different server. Do you want to have to tweak it all over again, and fix bugs that you figured out how to fix 6 months ago and you don’t remember?
I’d rather have some yaml files that do it for me. And it’s a new skill as well.
Docker is definitely worth the time investment.
If OP wants to go one level deeper: Ansible.
It’s not ad-friendly, and does not force you to create yet another account in yet another walled garden for big-tech to collect your data.
Thanks! I’ll check with my vps provider.
However, this proxy does not seem to be “within” the tor network itself, right? I’m just connecting someone to the first entry node on the system, correct?
Would I be transmitting unencrypted data? In other words, would an outsider be able to tell that I’m transmitting something illegal to a person accessing tor?