

I use AirVPN and a simple GlueTun container with socks proxy enabled then I can use any VPN provider.
I use AirVPN and a simple GlueTun container with socks proxy enabled then I can use any VPN provider.
As long as you protect that password store with a sufficiently strong password that you store in a password manager that has a sufficiently strong password :P
I joke but yes some sort of password store is what you would use but make sure that password store needs something like a yubikey with a strong private key on it _
The problem is how many random characters can you remember in your head?
A good encryption key would be around 32 characters to form a 256 bit encryption key.
You can do a fun game of encrypt the encryption key with a password but that’s just another vulnerability in the chain.
I recommend getting a PGP key stored on a yubikey and then encrypt all your notes with it since it’s all in markdown, I store my notes on Google drive and keep them decrypted in memory so that I can still use Obsidian.
What about envoy proxy?
Nothing else on the market has as low latency implications to workloads that I am aware of.
As someone with senior experience in cloud engineering here is my input, naming things is hard.
And God forbid you decide down the line you need a sub domain the terror of having service-b.service-a.com give me the chills.
But yeah 100% naming thing is difficult so you end up naming it after the software and using the group as the parent domain
Sorry this message didn’t make it.
The magic of the bad server is they have an R&D budget plus ops team so some waste while testing is covered, you tend to pay for mistakes on the good (home) server :P
Plus getting feedback from a good team beats a rubber duck XD
And then sometimes you use a work server to design the pattern for the home server.
If you want it to stand out don’t automate the compute and networking that’s so standardized these days that anyone can do it, Automated those IAM permissions.
I know that when hiring nothing gets me more excited about a candidate than them understanding how to securely bootstrap an environment.