@Wander
@packmates.orgThe future of selfhosted services is going to be... Android?
Wait, what?
Think about it. At some point everyone has had an old phone lying around. They are designed to be constantly connected, constantly on... and even have a battery and potentially still a SIM card to survive power outages.
We just need to make it easy to create APK packaged servers that can avoid battery-optimization kills and automatically configure an outbound tunnel like ngrok, zerotrust, etc...
The goal: hosting services like #nextcloud, #syncthing, #mastodon!? should be as easy as installing an APK and leaving an old phone connected to a spare charger / outlet.
It would be tempting to have an optimized ROM, but if self-hosting is meant to become more commonplace, installing an APK should be all that's needed. #Android can do SSH, VPN and other tunnels without the need for root, so there should be no problem in using tunnels to publicly expose a phone/server in a secure manner.
In regards to the suitability of home-grade broadband, I believe that it should not be a huge problem at least in Europe where home connections are most often unmetered: "At the end of June 2021, 70.2% of EU homes were passed by either FTTP or cable DOCSIS
3.1 networks, i.e. those technologies currently capable of supporting gigabit speeds."
Source: https://digital-strategy.ec.europa.eu/en/library/broadband-coverage-europe-2021
PS. syncthing actually already has an APK and is easy to use. Although I had to sort out some battery optimization stuff, it's a good example of what should become much more commonplace.
Quick question about DNS and DoH that I thought about after reading this post:
https://packmates.org/@silvereagle@furry.engineer/111176886781705659
Wouldn't it make sense for Firefox or another third party to bundle and transparently forward all DoH requests to cloudflare so that:
A) Cloudflare doesn't know who made what request due to not knowing the origin
B) Firefox doesn't know who made what request due to TLS
Federated wireguard network idea
Any feedback welcome.
Let's keep things stupidly simple and simply hash the domain name to get a unique IPv6 ULA prefix.
Then we would need a stupidly simple backend application to automatically fetch pubkeys and endpoints from DNS and make a request to add each others as peers.
Et voilà, you got a worldwide federated wireguard network resolving private ULA addresses. Sort of an internet on top of the internet .
The DNS entries with the public IPv4 / IPv6 addresses could even be delegated to other domains / endpoints which would act as reverse proxy (either routing or nesting tunnels) for further privacy.
Maybe my approach is too naïve and there are flaws I haven't considered, so don't be afraid to comment.
Exact use cases? Idk, but it sounds nifty.
#privacy #networking #VPN #wireguard #infosec
cc: @fediverse
Algorithm-based social media "recommendations" has normalized us putting up with blatant SPAM
Imagine if gmail or outlook were to place emails by 'creators and brands you might like' in your inbox!?
Following the process of enshittification, the algorithm on many social media platforms is becoming an excuse to push blatant amounts of SPAM to users. It starts as a feature that is genuinely useful, but becomes a tool to show you ads, content from paying users or to keep you hooked with rage-bait content as social media platforms seek to extract more value out of its users.
Algorithm-based social media has its benefits, but looking forward it is becoming increasingly necessary that such an algorithm runs client-side and is owned by the user.
cc: @showerthoughts
@lemmy I just realized that you can submit posts to any lemmy community from any mastodon / fediverse account. This is pretty cool!