

Check the README for piper. It moved to https://github.com/OHF-Voice/piper1-gpl


Check the README for piper. It moved to https://github.com/OHF-Voice/piper1-gpl


Nextcloud shouldn’t be seeing your MAC address. However, my guess is that Nextcloud has been configured to invalidate the session if the client IP changes, and randomizing the MAC address is one way that can happen.


Are you looking for a VPN or are you looking for an IPv6 tunnel broker like Hurricane Electric?


You can host a Proton mail bridge to use different apps running on different machines, including phones.
Self hosting e-mail, particularly SMTP, will likely require a static IP from a reputable provider. Mail servers may reject incoming mail based on the reputation of the sending server. You can avoid this by relaying through another SMTP server and configuring your DNS rules to allow that server to send mail on your behalf, but that’s not really self hosting anymore.


You can use OpenEBS to provision and manage LVM volumes. Host path requires you to manually manage the host paths.
That sounds like build automation. You can use some Git forge software.


Some attackers check services that have already cataloged the services you are running, even on uncommon ports. You won’t hear from them unless you are running a potentially vulnerable service.


If you’re self hosting Headscale you can configure your network such that Headscale is reachable on your network with or without internet access and available from the internet.


Don’t expect Gitea to make progress on federation. Forgejo is a fork of Gitea and anybody that cares about federation is probably on the Forgejo side of the fork.
If you’re running Kubernetes, what is the point of LXC or Proxmox in this setup? Kubernetes will give better scaling and utilization.


Giving a container access to the docker socket allows container escapes, but if you’re doing it on purpose with a service designed for that purpose there is no problem. Either you trust Watchtower to manage the other containers on your system or you don’t. Whether it’s managing the containers through a mounted docker socket or with direct socket access doesn’t make a difference in security.
I don’t know if anybody seriously uses Watchtower, but I wouldn’t be surprised. I know that companies use tools like Argo CD, which has a larger attack surface and a similar level of system access via its Kubernetes service user.


Mounting the docker socket into Watchtower is fine from a security perspective, but automatic updates can definitely cause problems. I used to use Rennovate and it would open a pull request to update the version.


Git does have a server component. When git connects to an ssh remote it executes an ssh command that needs to be present.


You’re missing GitLab. I’d be looking at GitLab or Forgejo.
But you might not need this. When you access a private Git repository, you’re normally connecting over SSH and authenticating using SSH keys. By default, if you have Git installed on a server you can SSH to and you have a Git repository on that server in a location you can access, you can use that server as a Git remote. You only really want one these services if you want the CI pipelines or collaboration tools.


The issue says at the bottom that SealedSecrets is unaffected.
At least in the past, if you had a fixed amount of work to complete, underclocking would increase overall power consumption.


Port scanning isn’t abuse but automatically filing frivilous abuse reports is.


It’s not normal for - model-cache:/cache to be deleted on restart or even upgrade. You shouldn’t need to do this.


The server responds with a 404 error. If you’re using a reverse proxy, make sure the reverse proxy rules are right. Does it work when you connect directly?
Wireguard normally runs with higher than root privileges as part of the kernel, outside of any container namespaces. If you’re running some sort of Wireguard administration service you might be able to restrict its capabilities, but that isn’t Wireguard. Most of my devices are running Wireguard managed by tailscaled running as root, and some are running additional, fixed Wireguard tunnels without a persistent management service.