There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

4rkal.eu.org

just_another_person , to selfhosted in SSH Remote Access NO Port-Forwarding NO Cloudflare | 4rkal

This is stupid. You’re still “connecting directly” to the instance. Your concern is about logging and traffic from your ISP being logged. This is the dumbest way to achieve this though, and reads as overly paranoid.

Just because you’re hanging one side out on Tor, does not mean your traffic isn’t logged. I don’t want to devolve into basic network operations, but this is stupid.

resetbypeer , to selfhosted in SSH Remote Access NO Port-Forwarding NO Cloudflare | 4rkal

Take a look at netbird or tailscale

ramielrowe , to selfhosted in SSH Remote Access NO Port-Forwarding NO Cloudflare | 4rkal

If I understand this correctly, you’re still forwarding it a port from one network to another. It’s just in this case, instead of a port on the internet, it’s a port on the TOR network. Which is still just as open, but also a massive calling card for anyone trolling around the TOR network for things to hack.

just_another_person ,

Didn’t see your comment until after I responded, but yes. This is what is happening. It’s stupid.

gaylord_fartmaster , to selfhosted in SSH Remote Access NO Port-Forwarding NO Cloudflare | 4rkal

lol I would open every port on my router and route them all to wireguard before I would ever consider doing this

Moonrise2473 , to selfhosted in SSH Remote Access NO Port-Forwarding NO Cloudflare | 4rkal

Isn’t it super slow to access via Tor?

neidu2 ,

Not necessarily. It can be, but it all depends on which nodes you get when you connect. If I end up on slow nodes I usually just reconnect, and it’s fine.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines