• 12 Posts
  • 377 Comments
Joined 9 months ago
cake
Cake day: February 8th, 2025

help-circle




  • Why is this a surprise? IP Logging is pretty normal for any service.

    2.5 IP logging: by default, we do not keep permanent IP logs in relation with your Account. However, IP logs may be kept temporarily to combat abuse and fraud, and your IP address may be retained permanently if you are engaged in activities that breach our Terms of Service (e.g. spamming, DDoS attacks against our infrastructure, brute force attacks). The legal basis of this processing is our legitimate interest to protect our service against non-compliant or fraudulent activities. If you enable authentication logging for your Account or voluntarily participate in Proton’s advanced security program, the record of your login IP addresses is kept for as long as the feature is enabled. This feature is off by default, and all the records are deleted upon deactivation of the feature. The legal basis of this processing is consent, and you are free to opt in or opt out of that processing at any time in the security panel of your Account. The authentication logs feature records login attempts to your Account and does not track product-specific activity, such as VPN activity.

    Source: Their privacy policy.



  • Pro-Tip: You can reverse proxy any service on your network but if the IP of your reverse proxy does not match the IP of your A record, aka your server is behind a VPN, the public will not be able to access your server.

    Http/s is neat that way, if the IP’s don’t match then it’s technically considered an insecure or misconfigured setup but it works great to prevent unauthorized access to one’s server.

    I must agree with other users here, hosting a public file hosting server is a bad idea, at the bare minimum Authentik or Keycloak should be in front of it but I digress, https://catbox.moe/ already endures this pain for us.


    Not sure what reverse proxy you’re using but alternatively Traefik’s middleware IPAllowList works great for blacklisting all IP’s and only whitelisting the known few.







  • Yeah, once you get the basics of BASH down Linux becomes really easy.

    Open up your Console/Shell/Terminal and type “help” it will give you the list of standard commands that let you navigate the shell.

    • cd = change directory
    • mkdir = make directory
    • nano = edit file
    • rm = remove file
    • rmdir = remove directory
    • sudo = run command as administrator/root privileges

    And once you get that going you’ll eventually get the options for each command, for example rm -rf is remove a file forcefully (the -f option), if you apply that command to directories it will remove anything within those directories with recursion (the -r option).

    You also don’t need to cd into a directory if you want to edit a file in it. For example nano /home/user/Desktop/SomeRandomFile.conf