If the user's data passes through nodes owned by one entity or their partners in this case NSA, FBI, GCHQ etc, it's going to be quite easy to find the origin IP...
I have two raspberry pi's 8gb, with SSDs. Running Portainer for Docker management.
I have everything containerized with docker-compose.
- Most importantly, Cloudflare tunnel for exposing my services without opening ports on my router.
- Tor relay (non-exit)
- Pi-hole for DNS and ad blocking
- Homepage dashboard
- Audibookshelf
- Jackett
- Sonarr
- Radarr
- Jellyfin
- qBittrorrent
- Backup Pi-hole
- Uptime Kuma
Monitoring everything with Zabbix which runs on a VPS.
you use portainer but "have everything containerized with docker-compose". am i missing something regarding portainer that supports compose files, or do you run containers via compose files and use portainer for monitoring/logging and such?
I hope many countries to follow this example, not by banning and censorship but actually banning the botnets that are no good and just for mining data.