The thing is, I just really prefer the tree view of Lemmy/Kbin…
Ugh, internet providers are annoying. Why is stuff like that even legal.
For situations like this I’ve had success with Shadowsocks, which you can combine with Wireguard, and run over Port 443, here’s a guide.
You could also try if it’s sufficient to just run vanilla Wireguard over port 443.
Edit: One issue you might run into with Shadowsocks is that combining it with Wireguard is not possible on mobile AFAIK.
huh, this is weird. one would think people would use separate machines / vms to test zero day exploits, not their main machines.
I’m considering migrating when that happens, as then I have no need for Mastodon, I can just have everything on one site…
whoa, this is an awesome resource, bookmarked!
I don’t really understand the problem here. Do these routers each have their own internet connection? Why can’t you just attach whatever device you are using to host stuff to one of them, configure your router for port forwarding, and be done? To get a domain name for free, you can use https://www.noip.com/.
If that mysteriously doesn’t work, you might want to investigate if your internet provider uses CGNAT (mine does). In that case, you might be able to contact them so they’ll turn it off for you. I don’t know about Germany, but in Austria they have to comply with your request, by law.
If you can’t do that or don’t want to expose your device to the internet directly, you have other options depending on whether you want your stuff to be public or not. For private services setting up WireGuard using wg-quick (on your Hetzner server) is really easy, reliable, and very secure. For public stuff, you might want to look at one of the services listed here. I recommend Cloudflare Tunnel, though it’s only meant for web stuff, no gameservers etc.
Feel free to ask for more help if you need more details.
I think Kbin is interesting because it seems to bring these two kinds of media together.
I wonder how they will enforce this. If you can just open a private window to bypass it, it won’t be very effective. Sure, they could do some fingerprinting, but I imagine avoiding false-positives would be very important, so I doubt they’d get very far with that.
Honestly, the only way I see is implementing a login wall, which I wouldn’t put past them. And that’s kinda scary. It would render so many links inaccessible to people without a Google account.
Or who knows, maybe they just want to make it more cumbersome and not completely prevent it, to get more people onto YouTube Premium, while the more determined people can continue adblocking because it’s not worth fighting a small minority.