this post was submitted on 26 Jun 2025
384 points (98.2% liked)

Selfhosted

48689 readers
1815 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

What’s your go too (secure) method for casting over the internet with a Jellyfin server.

I’m wondering what to use and I’m pretty beginner at this

you are viewing a single comment's thread
view the rest of the comments
[–] _cryptagion@lemmy.dbzer0.com 25 points 7 hours ago (1 children)

My go to secure method is just putting it behind Cloudflare so people can’t see my IP, same as every other service. Nobody is gonna bother wasting time hacking into your home server in the hopes that your media library isn’t shit, when they can just pirate any media they want to watch themselves with no effort.

[–] EncryptKeeper@lemmy.world 5 points 2 hours ago (2 children)

Nobody is gonna bother wasting time hacking into your home server

They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

[–] Auli@lemmy.ca -2 points 1 hour ago (1 children)

What a bunch of B's. Sure your up gets probed it's happening to every ipv4 address all the time. But that is not hacking.

[–] EncryptKeeper@lemmy.world 5 points 1 hour ago* (last edited 1 hour ago) (1 children)

Anything you expose to the internet publicly will be attacked, just about constantly. Brute force attempts, exploit attempts, the whole nine. It is a ubiquitous and fundamental truth I’m afraid. If you think it’s not happening to you, you just don’t know enough about what you’re doing to realize.

You can mitigate it, but you can’t stop it. There’s a reason you’ll hear terms like “attack surface” used when discussing this stuff. There’s no “if” factor when it comes to being attacked. If you have an attack surface, it is being attacked.

[–] meltedcheese@c.im 4 points 1 hour ago

@EncryptKeeper That’s my experience. Zombied home computers are big business. The networks are thousands of computers. I had a hacker zombie my printer(!) maybe via an online fax connection and it/they then proceeded to attack everything else on my network. One older machine succumbed before I could lock everything down.

[–] _cryptagion@lemmy.dbzer0.com 0 points 2 hours ago (1 children)

No, people are probing it right now. But looking at the logs, nobody has ever made it through. And I run a pretty basic setup, just Cloudflare and Authelia hooking into an LDAP server, which powers Jellyfin. Somebody who invests a little more time than me is probably a lot safer. Tailscale is nice, but it’s overkill for most people, and the majority of setups I see posted here are secure enough to stop any random scanning that happens across them, if not dedicated attention.

[–] EncryptKeeper@lemmy.world 2 points 1 hour ago* (last edited 1 hour ago) (1 children)

No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it. They’re actively trying to exploit vulnerabilities that exist in whatever outwardly accessible software you’re exposing is, and in many cases also in software you’re not even using in scattershot fashion. Cloudflare is blocking a lot of the well known CVEs for sure, so you won’t see those hit your server logs. If you look at your Authelia logs you’ll see the login attempts though. If you connect via SSH you’ll see those in your server logs.

You’re mitigating it, sure. But they are absolutely 100% trying to get into your server right now, same as everyone else. There is no consideration to whether you are a self hosted or a Fortune 500 company.

[–] _cryptagion@lemmy.dbzer0.com 0 points 8 minutes ago (1 children)

No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it.

No, they aren't. Just to be sure, I just checked it, and out of the over 2k requests made to the Authelia login page in the last 24 hours, none have made it to the login page itself. You don't know jack shit about what's going on in another persons network, so I'm not sure why you're acting like some kind of expert.

[–] EncryptKeeper@lemmy.world 1 points 1 minute ago

Yes they are. To suggest they’ve would be a statistical wonder.

2k requests made to the Authelia login page in the last 24 hours

Are you logging into your Authelia login page 2k times a day? If not, I suspect that some (most) of those are malicious lol.

You don't know jack shit about what's going on in another persons network

It’s the internet, not your network. And I’m well aware of how the internet works.

I'm not sure why you're acting like some kind of expert

Well I am an expert with over a decade of experience in cybersecurity, but I’m not acting like an expert here, I’m acting like somebody with at least a rudimentary understanding of how these things work.