

So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
“If I see you on the street, I’ll shoot you.”
You joke, but we already know that simply using Linux gets you on an NSA watch list.
https://www.eweek.com/security/linux-lands-on-nsa-watch-list/
Piracy is the great economic equalizer in the age of digital exploitation.
Memorize the kernel, stick your dick in the PCIe slot, I N S T A L L
I, too, shoplift my install USB’s. /s
My ratchet way of doing it is Backblaze. There is a docker container that lets you run the unlimited personal plan on Linux by emulating a windows environment. They let you set an encryption key so that they can’t access your data.
I’m sure there are a lot more professional and secure ways to do it, but my way is cheap, easy, and works.
Making it pseudo-public and not using docker would be a mistake, in my opinion. Anything public-ish can benefit from the extra security of docker’s sandboxing.
It will also make it much easier to run things through a VPN with Gluetun—something you definitely want to do if you have strangers using your SearXNG instance.
You should really consider a container of some kind.
This. ProxMox will save you many times over while you are learning. It makes it so easy to backup and restore, try out new projects in a sandbox, and much much more.
I credit ProxMox with making me bolder about what I wanted to accomplish and having the courage and time to take risks while knowing I could always restore from backup in an instant.
Gluetun is the way. Get a transmission docker container, set up a gluetun docker container, set the gluetun container as the network for the transmission container.
Viola, you have a perfectly working VPN with a kill switch.
I have about 60TB in mine. Media, man. Collecting is addictive.
I’m basically trying to do exactly what you are describing in your first paragraph. As I understand it, OBS Studio wants the camera directly connected to the device it is on, and MistServer allows it to be remotely connected from a different device on the local network. I’m trying to use Tailscale to create a local-ish network environment.
I haven’t heard of Dararhei before—I will definitely investigate that to see if it is a better solution than MistServer. From a cursory look, it seems like they basically do the same thing.
Because OBS studio allows me to have more control of the stream, do overlays on the screen, etc. I need to remotely connect to that software, and then it broadcasts it to Kick, YouTube, etc.
If I stream directly, then it will cut the stream if I lose cell connection, which is likely at times in Mexico, and I will basically be stuck to streaming on one service at a time.
The other advantage of having overlays with my username is that it will help people find me if I get clipped and put on YouTube by viewers.
This is an example of a service that does what I’m trying to do, but I’m trying to do the same thing for much cheaper:
Bruh, pirate? I’m talking about a livestream. A livestream of me that I will broadcast to an audience. Totally legal, no copyright—my original content.
Care to give me a hint?
To stream IRL in Mexico.
You are correct, they have infiltrated exit nodes, but it is still one of the most secure privacy tools available. If you are Al Quaeda, don’t use tor. If you are an average person preserving their privacy or subverting censorship, use tor.