Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 37 Posts
  • 1.29K Comments
Joined 11 months ago
cake
Cake day: March 24th, 2025

help-circle


  • irmadlad@lemmy.worldtoSelfhosted@lemmy.worldNon-US cloud storage for backup?
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    15 hours ago

    I know you specifically asked for non-US back up solutions, but I honestly don’t think you can beat Backblaze’s personal tier, as far as pricing. $99 per year for unlimited storage. Solid company, I’ve been using them for years. If you are encrypting your backups, and following the 3,2,1 back up schema, should Uncle Sam grab your backup, it’s pretty much useless and you still have a couple backups in hand. You can encrypt with VeraCrypt or similar, and push that up the pipe to BackBlaze.

    The caveats to using BackBlaze are, whatever you are backing up, has to be connected to the PC/Server. So, no NAS although someone here mentioned a work around for that, so if you go the BackBlaze, make sure you ask here what that option is because my frail brain cannot remember what the name of it was, but apparently it works well. Other such options would be rclone, Mountain Duck, ExpanDrive, or odrive. These are unofficial softwares, and can/could lead to termination of your account. Secondly, if you’re pushing aver 10 TB to BackBlaze and you need to restore, 10 TB is going to be a bitch to do online. However, you can ‘rent’ a HDD from BackBlaze. They’ll mail it to you, you restore your data, and send the drive back for a full refund, or keep it should you wish.

    I receive no compensation from BackBlaze for this recommendation.



  • See, I understand that when using 1.1.1 or 1.0.0.1, Cloudflare will assign different IP’s to use as it deems necessary. That was not the issue. The issue was the VPN was reporting several different IP’s, same IP block owned by the VPN (first three octets were the same), but different ending octets. That has never occurred in the years I’ve been using a VPN and checking every morning. So that is what caused the heartburn. I am running the VPN on my pFsense box.


  • The issue is that I know what I know, and that’s it. LOL I’ve had a computer in front of me since the mid 70s, but don’t equate longevity with knowledge. I am self taught in most everything I do whether in real life or digital life. So when something pops up that’s different to your regularly scheduled program, it cause anxiety. Since I am not a real IT professional, solving the issue can sometimes be tedious.

    I am, however, a bit sensitive to the word ‘paranoia’. It’s not paranoia to check yourself before you start the day. It takes less than thirty seconds to validate dns leak checks while I’m sipping my coffee. Also, if it wasn’t a habit every morning to check, I probably would have been clueless to the situation. It could have been leaking and I would have never known it.

    's-aright. I appreciate greatly, everyone’s willingness to help and give their input. No harm - no foul.



  • But the outcome is the same: you have no control over this behaviour.

    Yes, I totally understand that. It seemed suspicious to me because it had never happened to me before. (I have bookmarked a few articles about this 'Round Robin to read this evening) Like I said, This check gets done every morning, and has been a ‘ritual’ for years, and I have had the same VPN provider for years. So, that is what triggered my anxiety. I appreciate what everyone else has said, and I bow to greater knowledge bases than I possess. At the very least, TIL. So it’s been a good day 'tater.






  • Am I missing anything here or is this how I’m supposed to be doing it?

    AFA fail2ban, I always set up the jails in aggressive mode:

    [sshd]
    mode = aggressive
    enabled = true
    port = ssh
    filter = sshd
    logpath = /var/log/auth.log
    maxretry = 5 <---edit to tastes
    bantime = 3600 <---edit to tastes
    findtime = 600 <---edit to tastes
    

    You might want to check out Crowdsec, maybe deploy Tailscale as an overlay. How many users are you providing services for? If just yourself, I use the host allow / host deny feature in Linux. Just make sure you do host allow first, lol.