You would not. In the example given 169.254.1.1 doesn’t even exist, no machine is listening on that address so it couldn’t possibly do any good if it wanted to
You would not. In the example given 169.254.1.1 doesn’t even exist, no machine is listening on that address so it couldn’t possibly do any good if it wanted to
Setting the default gateway is unnecessary for a network of peers that are already on the subnet. It can only lead to problems as the hosts try to send every request outside their network to 169.254.1.1, which doesn’t even exist in this scenario
The poster you’re replying to is suggesting a static IP in the apipa range, not an apipa assigned ip. You’d already know a static IP because you set it yourself.
For profit prisons are creepy and ought to be illegal, but they’re also a small percentage of US prisons. They’re not to blame for the high prison population. They’re another symptom.
Technically true but I wouldn’t suggest using a self signed cert on the internet under any circumstances.
Absolutely do not expose your server on port 80. Http is unencrypted, you’d be sending your login credentials in plaintext across the open internet. That is Very Bad™. If you own a domain name, you can set up a letsencypt cert fairly easily for free. Then you could expose 443 and at least your traffic will be encrypted in transit. It won’t solve the other potential issues of exposing your instance like brute force or ddos attacks, but I’d consider it a bare minimum.
If you use a VPN like many others are suggesting it won’t matter as much because the unencrypted traffic never leaves your local network.
Wireguard installation is going to be much more secure than a Nextcloud
I understand that, and it’s a good suggestion and a better solution if it fits the OPs use case. I don’t understand suggesting they do both. Either VPN or port forwarding solve the problem, doing both seems unnecessary.
before you start forwarding ports on your router
Don’t you mean instead of? If all the OP wants to do is access next cloud, they can do it over the VPN without forwarding ports. What you’re suggesting doesn’t solve the problem of port 80 being an attack vector, and adds yet another attack vector (the VPN itself)
The US has hate crime laws. It does not have hate speech laws. A hate crime requires an existing crime. You can legally shout the n-word from the rooftops. If you beat someone while shouting the n-word, your assault is upgraded to a hate crime.
Doesn’t wireguard’s zero config work by relaying through an outside web service? Seems like the LG solution with extra steps.
The reason is so you can control it from anywhere without setting up port forwarding and a static IP. Most people don’t understand, or can be bothered, doing that. I get why you don’t like it, I wouldn’t like it either, but it’s not some conspiracy.
Sirius pays them. You’re more likely to subscribe if your car already has the radio. Same reason your shitty Walmart laptop comes with McAfee.
deleted by creator
If we’re being pedantic TOS is the only one that’s actually named “star trek”.