5 actually because you can use minimal hardware. You can probably just port forward your router and run caddy on the same jellyfin server but then expose your home IP address.
- 0 Posts
- 21 Comments
Obscuring home IP is the big one. You also don’t have to fiddle with opening ports on your router and maybe getting ISP attention for hosting on a residential network. But really obscuring home IP address would work.
Dirt simplest solution is caddy on the same jellyfin server and port forward 443 and 80 on your router to that host. Hopefully letsencrypt will work without a domain but I’m not sure.
But I ran into challenges getting my server safely accessible for users outside my LAN
FWIW:
- vps + domain (optional?)
- connect vps to home server with wireguard (eg Tailscale)
- reverse proxy on the VPS forwarding to jellyfin (eg Caddy)
Obviously not as trivial or seamless as Plex. Also I wouldn’t try to complicate this setup by using docker for everything. But once its up you can basically host whatever you want on the WAN from your LAN.
Also Fedora and “well-built” - it’s glossy and smooth-looking, but not “well-built”.
Example from experience:
dnfrequires more than 1G to do a system update. Try to run in on a minimal VPS and dnf will keep getting OOM killed.
Yeah but its pretty easy to avoid them. They survive on government contracts not community support. There’s lots of better alternatives than Fedora.
sudo@programming.devto
Privacy@lemmy.ml•Is a NAS the ultimate goal? Which yes - which one?
2·7 months agoI doing the same thing but someone told me about HBA cards and that’s what I’d do next time I upgrade. Way more affordable flexible and efficient then trying to find a mobo with 8 data ports.
sudo@programming.devto
Linux@programming.dev•I am really considering moving from Arch to Fedora. What's your experience with this?
1·8 months agoLast I tried, about a year ago,
dnfhad some bug where it would load the entire package tree into memory and require more than a gig to run. Whenever I tried to update my a minimum spec VPS, the package manager would get OOM killed.
Many are, yes, but 1) be selective of what union you join, 2) you’re union vote counts more than your federal vote. Usurping a corrupt union boss is a much smaller task than usurping a corrupt democrat and can yield far more results.
Freshly organized work places are almost always more radical than those those entrenched, so organizing your workplace now is more important than ever. Then you can pick which union to join.
Lack of criticism of the US government in the first place is what got us here. You can say the GOP is worse all you want but you must admit that the Democrats are massive fuck ups too if you want things to ever get better.
You can’t keep falling for this notion of “every criticism of the democrats is supporting the GOP”. Its not even an election year for Christ’s sake.
Look for ways to pursue political goals beyond obediently punching a ballot. The billionaires don’t control politics just because they vote harder. There’s lots of ways to go about it but almost all practical strategies involve being a part of a larger organization. Unions are the most classic example.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
2·9 months agoI’ve been criticizing Anubis and Proof of Work solutions in general. Its my speculation that they mostly work just by requiring you to execute javascript not by being an actual burden on the bots CPU.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
1·9 months agoWanting to not get fingerprinted is totally fair. I’m just stating what will and won’t work at scale. But please understand, you’re ability to view the internet anonymously is wholly equivalent to a bots.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
1·9 months agoAdmins will always turn down the bot management when it starts blocking end users. At that point you cough up the money for the extra bandwidth and investigate different solutions.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
1·9 months agoMost bots and scrapers from what I’ve seen already are using (headless) full browsers
That’s not going to be the majority of your bot traffic by a long shot because it doesn’t scale like using basic HTTP requests.
This is from personal experience. With PoW you just need any puppetted browser, maybe less. With Canvas finerprinting you need a heavily customized scraping browser, either one you made yourself or one you’re paying for. If that’s the case the cost of PoW is neglible. If you still want actual stats, I’d have to ask where you’re getting any stats on PoW working.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
0·9 months agoThe assumption is correct. PoW has been proven to significantly reduce bot traffic.
What you’re doing is filtering out bots that can’t be bothered to execute JavaScript. You don’t need to do a computational heavy PoW task to do that.
meanwhile the mere existence of residential proxies has exploded the availability of easy bot campaigns.
Correct, and thats why they are the number one expense for any scraping company. Any scraper that can’t be bothered to spin up a headless browser isn’t going to cough up the dough for residential proxies.
Demonstrably false… people already do this with abysmal results. Need to visit a clownflare site? Endless captcha loops. No thanks
That’s not what “demonstrably false” even means. Canvas fingerprinting filters out bots better than PoW. What you’re complaining about too strict settings and some users being denied. Make your Anubis settings too high you’ll have users waiting long times while their batteries drain.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
0·9 months agoProof of Work is a terrible solution because it assumes computational costs are significant expense for scrapers compared to proxy costs. It’ll never come close to costing the same as residential proxies and meanwhile every smartphone user will be complaining about your website draining their battery.
You can do something like only challenge data data center IPs but you’ll have to do better than Proof-of-Work. Canvas fingerprinting would work.
sudo@programming.devto
Linux@programming.dev•FOSS infrastructure is under attack by AI companies
1·9 months agoWhats confusing the hell out of me is: why are they bothering to scrape the git blame page? Just download the entire git repo and feed that into your LLM!
9/10 the best solution is to block nonresidential IPs. Residential proxies exist but they’re far more expensive than cloud proxies and providers will ask questions. Residential proxies are sketch AF and basically guarded like munitions. Some rookie LLM maker isn’t going to figure that out.
Anubis also sounds trivial to beat. If its just crunching numbers and not attempting to fingerprint the browser then its just a case of feeding the page into playwright and moving on.


Sounds like you don’t need the VPS then. Add a subdomain to your home IP. Port forward 443 and 80 to the sever. Run caddy to route the subdomain to localhost:8096. You will also need to tell jellyfin to accept on the new domain.