Recent Discussions
Risks of self hosting
Open in DiscordUnanswered
Polar bear posted this in #questions
14 messages
0 views
Polar bearOP
I’m planning on setting up an old PC for self hosting. I will be using TCPshield to proxy to avoid my home wifi being ddosed, other than that, is there anything else I’m missing?
Polar bearOP
Ubuntu
Kromfohrländer
First I'd really advise you don't, as it's a lot of risk for not a lot of payoff, but other than proxying and ensuring no backend IP leaks you should be fine
Slightly cheaper and they support more players
@Kromfohrländer First I'd really advise you don't, as it's a lot of risk for not a lot of payoff, but other than proxying and ensuring no backend IP leaks you should be fine
Polar bearOP
What are the other risks than ddos safety?
@Polar bear What are the other risks than ddos safety?
Kromfohrländer
IP leaks lead to your general location being found, if you live in a first world country maybe even your more exact location
From there if the attackers have more info on you and a person there's a whole slew of social engineering attacks possible
But I mean even if you get IP leaked, no immediate or real danger unless someone decided to be jobless
Polar bearOP
How do IP leaks happen though
@Polar bear How do IP leaks happen though
Common Murre
IP leaks behind proxies occur when your true IP address is exposed despite using proxy protection. This commonly happens through WebRTC browser vulnerabilities, DNS requests bypassing the proxy tunnel, application-level traffic ignoring proxy settings, or improper proxy configurations. Browser fingerprinting techniques can also track users without directly exposing IPs. Split tunneling, where only some traffic routes through the proxy while other connections use your regular network, represents another significant vulnerability point.
@Common Murre IP leaks behind proxies occur when your true IP address is exposed despite using proxy protection. This commonly happens through WebRTC browser vulnerabilities, DNS requests bypassing the proxy tunnel, application-level traffic ignoring proxy settings, or improper proxy configurations. Browser fingerprinting techniques can also track users without directly exposing IPs. Split tunneling, where only some traffic routes through the proxy while other connections use your regular network, represents another significant vulnerability point.
Ok look I’m sure op didn’t come here to get an ai answer that’s not even application specific to Minecraft
@Masai Lion Lmllmtfy.com should totally be a thing.
Kromfohrländer
Tf does that mean 😭
Loading...
Loading...