Interessante, ma una riga per spiegare cosa sia Cryptee potrebbe attirare più interesse.
Shimitar
The same way you back it up, using ssh remotely for example
Just run backrest backup on each server three times, one for each remote backup tepository. Easy enough.
Agreed, nextcloud is a beast with lots of whistles, if you don't need them you can have simpler solutions
This my approach here https://wiki.gardiol.org/doku.php?id=selfhost%3Afileserver
And I stated using AList which is a funny piece of software that has great potential. See here https://wiki.gardiol.org/doku.php?id=services%3Aalist
You can share jellyfin on the net. I do.
The issues shared wide and large are mostly moot points, where the attacker needs to already have access to the jellyfin itself to have any surface.
Its FUD and I am convinced spread by Plex people in an effort to cover up their fuckup and enshittyfication.
Races. Today a 3.8km swim in sea, Sunday half marathon (21km) with 150m positive gain. It will be fun!
I have a Pope joke, its called Italy.
Nah, I love ghosts...
Deep level packet inspection, they detect patterns or whatever in encrypted traffic (and the lack of thereof) and ban the destination ip china-wide.
How they do I have no idea, but they do, on my direct first hand experience. Its not based on domain names, directly straight and total ip ban. All ports, all domains on that ip get banned forever just because you started using a VPN (OpenVPN in my case, it was a few years ago).
Trying to setup in a satisfactory manner my navidroid server and symphonium app to replace Spotify.
Not very successful, but do I get to listen to a lot of stuff...
It will work for a bit, then they will detect VPN traffic and just block the destination ip for good. Any ip you will use will be shortly unreachable for you, so be prepared to that.
Tube archivist + jellyfin plugin.
Works wonders.
Here my setup guide: https://wiki.gardiol.org/doku.php?id=services%3Atubearchivist