Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
-
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
They can't or they don't?
My question too, pretty sure you can
The smallest possible subnet has 18.4 quintillion addresses.
You can't scan it before encountering the heat death of the universe.
Outgoing connections are made on a different address that does not accept incoming connections. You never disclose your real IP when browsing.
So, no. It can't be done.
That's only if you use the brute force method
IPs are not secret and can be leaked in various ways. Don't count on IPv6 as a security mechanism as that's not what it was designed to do
It's literally called "IPv6 privacy extension". It's what it does.
Unless you're in the middle and fowarding the packets, you won't stumble across a connectable IPv6 endpoint.
The IPv6 privacy extensions are something else entirely and are not used for anything server side
You should research IPv6 port scanning techniques. It is harder than IPv4 but still doable depending on the context. If your goal is simply to reduce network traffic due to bots that's one thing. However, it should not be considered a security mechanism.