diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..eac9183 --- /dev/null +++ b/LICENSE @@ -0,0 +1,9 @@ +MIT License + +Copyright (c) 2023 aiquiral + +Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. diff --git a/animation.html b/animation.html new file mode 100644 index 0000000..6d824bc --- /dev/null +++ b/animation.html @@ -0,0 +1,55 @@ + + + + Category - Animation | Aiquiral's Blog + + + + + + + +
+
+ +
+
+ +
+

Category - Animation

+ + + + + + + +
+
+

MusicOther ProjectsPrivacy PolicyAbout

+
+ + \ No newline at end of file diff --git a/assets/css/style.css b/assets/css/style.css new file mode 100644 index 0000000..7da0ba5 --- /dev/null +++ b/assets/css/style.css @@ -0,0 +1,365 @@ +body { + margin: 0; + padding: 0; + font-family: "DejaVu Sans", sans-serif; + display: flex; + min-height: 100vh; + flex-flow: column; + color: #25252D; + line-height: 1.5; +} + +h1, h2 {line-height: 1.25;} + +.line-top{ + height: 22px; + background-image: linear-gradient(145deg, #4c4dfb , #706efb); + box-shadow: rgba(0, 0, 0, 0.35) 0px 5px 30px; +} + +.line-bottom { + height: 22px; + background-image: linear-gradient(145deg, #706efb, #4c4dfb); + bottom: 0px; + width: 100%; + box-shadow: rgba(0, 0, 0, 0.35) 5px 0px 30px; +} + +.foot { + position:relative; + bottom: 22px; + width: 100%; + text-align: center; +} + +.foot a{text-decoration: none !important;color: #25252D;} + +*{ + box-sizing: border-box; + margin: 0; + padding: 0; +} + +body { + --color1: #FFF ; + --color2: #000 ; +} +.nav-bar { + width: 100%; + display: flex; + justify-content: space-between; + align-items: center; + list-style: none; + position: fixed; + padding: 25px 30px; +} +.logo img {width: 100px;} +.menu {display: flex;} +.menu li {padding-left: 30px;} +.menu li a { + display: inline-block; + text-decoration: none; + color: #b4b4bb; + text-align: center; + transition: 0.15s ease-in-out; + position: relative; + text-transform: uppercase; +} +.menu li a::after { + content: ""; + position: absolute; + bottom: 0; + left: 0; + width: 0; + height: 1px; + background-color: #25252d; + transition: 0.15s ease-in-out; +} +.menu li a:hover:after {width: 100%;} +.open-menu , .close-menu { + position: absolute; + cursor: pointer; + font-size: 50px; + display: none; +} +.open-menu { + top: 50%; + right: 20px; + padding: 15px 20px; + transform: translateY(-50%); + background-color: #25252d; + color: #fff; +} +.close-menu { + top: 75px; + right: 75px; + color: #b4b4bb; +} +#check {display: none;} + +.menu { + flex-direction: column; + align-items: center; + justify-content: center; + width: 30%; + height: 100vh; + position: fixed; + top: 0; + right: -100%; + z-index: 100; + background-color: #000; + transition: all 0.2s ease-in-out; +} +.menu li {margin-top: 40px;} +.menu li a {padding: 10px;} +.open-menu , .close-menu {display: block;} +#check:checked ~ .menu {right: 0;} + +@media (max-width: 1080px) { + .menu { + width: 60%; + } +} + +.main, .blog-post { + flex-grow: 1; + display: flex; + flex-flow: column; +} + +.blog-post{ + padding: 5vw 25%; +} + + + +.featured { + display: block; + margin-left: auto; + margin-right: auto; + width: 100%; +} + +.inline-img{ + max-width: max-content; + width: 100%; +} +.latest { + display: block; + margin-left: auto; + margin-right: auto; + width: 100%; +} + +code, pre { + background-color: #eee; +} + +pre { + padding: 10px; + margin: 10px 10px 10px 0px; + color: #555; + border-left: 2px solid !important; + overflow-x: auto; +} + +.hero { + display: flex; + padding: 5vw 20%; + gap: 50px; +} + +.latest-post{flex:67%;} +.search-and-categories{flex:33%} + +@media (max-width: 1203px) { + .hero { + flex-wrap: wrap; + } +} + +@media (max-width: 1080px) { + .latest-post { + margin-top: 80px; + } + .blog-post{ + padding: 5vw 10%; + margin-top: 80px; + } +} + + +h1 { + margin: 30px 0px 30px 0px; +} + +h2{ + margin: 30px 0px 20px 0px; +} + +h3{ + margin: 20px 0px 10px 0px; +} + +h4 { + margin-top: 20px; +} + + +input#search-bar { + margin-top: 100px; + width: 100%; + height: 45px; + padding: 0 20px; + font-size: 1rem; + border: 1px solid #b4b4bb; + outline: none; + &:focus { + border: 1px solid #4C4DFB; + transition: 0.35s ease; + } +} + +.categories {display: flex; flex-wrap: wrap;} + +.category-button-div { + background-color: #4C4DFB; + padding: 15px 20px; + border-radius: 10px; + margin: 0px 10px 10px 0px; + border: solid 3px #4C4DFB; + transition: 0.2s ease-in-out; + &:hover{ + background-color: #333; + transition: 0.2s ease-in-out; + } +} + +.category-button { + text-decoration: none; + color:#FFF; +} + +a { + text-decoration: none; + color: #2ea3f2; +} + +.author { + display: flex; + background-color: #eee; + padding: 5vw 20%; +} + + +.meri-photo-div{ + width: 50%; + padding: 20px; + display: flex; + flex-direction: column; + justify-content: center; +} + +.meri-photo { + width: 100%; +} + +.meri-bio{ + width: 50%; + padding: 20px; + display: flex; + flex-direction: column; + justify-content: center; + text-align: justify; +} + +@media (max-width: 1203px) { + .author { + flex-direction: column; + } + .meri-photo-div{width: auto;} + .meri-bio{width: auto;} +} + +p{ + color: #555; + margin: 10px 0px 10px 0px; + text-align: justify; +} + +.post-date{ + margin-bottom: 30px; +} + +.post-heading { + margin-bottom: 10px; +} + + +.all-posts{ + padding: 1vw 20% 2vw 20%; +} + +.all-posts-table{ + display: flex; + flex-wrap: wrap; + gap: 10px; +} + +.allposts-post{ + min-width: auto; + max-width: 300px; + display: flex; + flex-direction: column; + padding: 15px; + border: 1px solid #ccc; + border-radius: 10px; +} + +.comments{ + padding: 1vw 25%; +} +/* +@media (max-width: 1080px) { + .all-posts-table { + flex-direction: column; + } + .comments{ + padding: 1vw 10%; + } +} */ + +li { + margin: 5px 20px; + color: #555; +} + +.important-note{ + border-left: 5px solid rgb(250, 200, 110) !important; + border-radius: 10px; + padding: 10px; + margin: 20px 10px 20px 0px; + background-color: rgb(250, 250, 210); +} + +#search-results a { + display: block; + padding: 10px 0px; +} + +thead { + text-align: left; + background-color: #eee; +} + +table { + border-collapse: separate; + border-spacing: 0; + border: 1px solid #eee; + margin: 10px 0px; +} + +td, th { + border-bottom: 1px solid #eee; + padding: 12px; +} \ No newline at end of file diff --git a/assets/logo/aiquiral.avif b/assets/logo/aiquiral.avif new file mode 100644 index 0000000..5f3e546 Binary files /dev/null and b/assets/logo/aiquiral.avif differ diff --git a/assets/logo/favicon.svg b/assets/logo/favicon.svg new file mode 100644 index 0000000..fb1eb17 --- /dev/null +++ b/assets/logo/favicon.svg @@ -0,0 +1,39 @@ + + + + + + + diff --git a/assets/logo/inline-logo.svg b/assets/logo/inline-logo.svg new file mode 100644 index 0000000..ba36d5b --- /dev/null +++ b/assets/logo/inline-logo.svg @@ -0,0 +1,49 @@ + + + + + + + + + + diff --git a/assets/posts/2023-04-26-awesome-privacy/awesome.svg b/assets/posts/2023-04-26-awesome-privacy/awesome.svg new file mode 100644 index 0000000..2ed1d5b --- /dev/null +++ b/assets/posts/2023-04-26-awesome-privacy/awesome.svg @@ -0,0 +1 @@ + diff --git a/assets/posts/2023-05-19-proton-vpn-linux-guide/proton.svg b/assets/posts/2023-05-19-proton-vpn-linux-guide/proton.svg new file mode 100644 index 0000000..3f36b07 --- /dev/null +++ b/assets/posts/2023-05-19-proton-vpn-linux-guide/proton.svg @@ -0,0 +1 @@ +Linux GuideInstall, Configure, Use & Auto-Connect diff --git a/assets/posts/2023-05-19-proton-vpn-linux-guide/protonvpn-cli_-help.avif b/assets/posts/2023-05-19-proton-vpn-linux-guide/protonvpn-cli_-help.avif new file mode 100644 index 0000000..1e7f7c0 Binary files /dev/null and b/assets/posts/2023-05-19-proton-vpn-linux-guide/protonvpn-cli_-help.avif differ diff --git a/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap.avif b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap.avif new file mode 100644 index 0000000..116e8a7 Binary files /dev/null and b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap.avif differ diff --git a/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_build-finish.avif b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_build-finish.avif new file mode 100644 index 0000000..1b51b2b Binary files /dev/null and b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_build-finish.avif differ diff --git a/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_thumb.avif b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_thumb.avif new file mode 100644 index 0000000..abad330 Binary files /dev/null and b/assets/posts/2023-05-21-remap-keyboard-keys-using-evremap/evremap_thumb.avif differ diff --git a/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat-b.avif b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat-b.avif new file mode 100644 index 0000000..15f2143 Binary files /dev/null and b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat-b.avif differ diff --git a/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.avif b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.avif new file mode 100644 index 0000000..c02a27e Binary files /dev/null and b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.avif differ diff --git a/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.svg b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.svg new file mode 100644 index 0000000..c7b247a --- /dev/null +++ b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat.svg @@ -0,0 +1,199 @@ + + + +Bypass CGNATPrivately Expose Services Hosted on Your Homeserver diff --git a/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb-b.avif b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb-b.avif new file mode 100644 index 0000000..0c49267 Binary files /dev/null and b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb-b.avif differ diff --git a/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb.avif b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb.avif new file mode 100644 index 0000000..da9a8cf Binary files /dev/null and b/assets/posts/2023-10-07-bypass-cgnat/bypass-cgnat_thumb.avif differ diff --git a/awesome-privacy.html b/awesome-privacy.html new file mode 100644 index 0000000..9f55d77 --- /dev/null +++ b/awesome-privacy.html @@ -0,0 +1,923 @@ + + + + Awesome Privacy | Aiquiral's Blog + + + + + + + +
+
+ +
+
+ +

Awesome Privacy

+

26 April 2023 | Privacy, Self-hosting

+ Sunglasses. Awesome Privacy. + + +

A list dedicated to providing the best tools and services to protect your online privacy. [UPDATED – 05 May 2023]

+ +

Disclaimer

+ +

Please keep in mind that the software programs and services listed below are based on my personal knowledge and experience. I have not received any payment to include any specific software program or service in this list, and there are no affiliate links. However, it’s important to do your own research and make your own informed decisions based on your unique needs and circumstances.

+ +

This Awesome Privacy list has been inspired by privacytools.io, awesome-privacy.xyz, awesome-privacy by pluja and many others.

+ +

Content

+ +
    +
  1. Introduction + +
  2. +
  3. Privacy Essentials + +
  4. +
  5. Communication and Social + +
  6. +
  7. Personal + +
  8. +
  9. Productivity Tools + +
  10. +
  11. Entertainment + +
  12. +
  13. Security + +
  14. +
  15. Advanced + +
  16. +
+ +
+ +

Introduction

+ +

Difference between Privacy, Anonymity and Security.

+ +

People often mix the concepts of privacy and anonymity, and sometimes security too. Here is a table that provides a comparison of privacy, anonymity, and security to help clarify the distinctions between these related concepts.

+ + + + + + + + + + + + + + + + + + + + + + + + + + +
ConceptDefinitionExample
PrivacyThe ability to control access to personal information or actions. {:/}Using a VPN to browse the internet to prevent your ISP from spying on you. {:/}
AnonymityThe state of being unknown or unidentifiable. {:/}Using a disposable email address when signing up for online services. {:/}
SecurityThe protection of assets or resources from unauthorized access, use, disclosure, disruption, modification, or destruction. {:/}Using a firewall to prevent unauthorized access to a computer network. {:/}
+ +
+ +

Explain like I am a 5-year-old. (ELI5)

+ +

Suppose you have a diary that you keep locked in a drawer in your bedroom. The diary is your personal possession, and you have the right to keep it private. The lock on the drawer provides a level of security that prevents others from accessing your diary without your permission. If you were to write in the diary using a pseudonym, you would be maintaining anonymity.

+ +

So, in this example, privacy refers to the ability to keep personal information or possessions away from others. Security refers to the protection of personal possessions from unauthorized access or theft. Anonymity refers to the state of being unknown or unidentifiable.

+ +
+ +

With this article, I hope to achieve the goal of helping you maintain all three of these.

+ +

Open Source.

+ +

All the pieces of software and services mentioned in this article are open-source.

+ +

Open source software is important for privacy because it enables greater transparency and accountability in the development of software. Since the source code is freely available for anyone to view, it can be inspected by security experts to identify any potential security vulnerabilities or backdoors that could be exploited by malicious actors. This means that security vulnerabilities can be identified and patched more quickly, reducing the risk of data breaches and other security incidents that could compromise personal information.

+ +

Why you should care.

+ +

Do you have curtains in your home? This is because you want to keep certain activities private and don’t want strangers to know what you do. But why would you want large companies such as Google, Apple, Microsoft, Oracle, and even smaller companies to collect your personal information? Your answer may be, “I like targeted ads as they help me find new products,” or, “I want those companies to improve their products to help me serve better.” But that is not all they use your data for. Take a look at these articles:

+ + + +
+ +

“But I have nothing to hide.”

+ +

Read this – https://thenextweb.com/news/read-this-if-youve-got-nothing-to-hide

+ +
+ +

I can cite over a hundred articles like these, but it is up to you to understand why privacy matters.

+ +

1. Privacy Essentials

+ +

Basic Android Apps

+ +

Apps that come preinstalled on phones, as well as those on the Google Play Store, often contain advertisements and tracking mechanisms. They may also request access to unnecessary information. Using open-source alternatives for basic apps can provide a more private and secure experience for users.

+ +

App Stores

+ +

Stay away from app stores like Google Play Store, Amazon App Store, Samsung App Store, GetApps etc., as they are known to collect user data, such as app usage and location information.

+ +

Although, the best course of action is to download the source code and compile the application yourself, but the following alternates can also be helpful.

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
AlternatesProspective AdvantagesConservative Disadvantages
F-Droid
  • All apps are open-source.
  • Has a strict inclusion policy, which means all apps are checked for security and privacy before being included in the app store.
  • Direct APK downloads also available on the website.
  • Supports 3rd-party repositories.
  • Not the best UI/UX.
  • Updates may get delayed as they cannot be triggered by the developer directly.
  • Aurora Droid
  • Fork of F-Droid.
  • Better UI.
  • Updates may get delayed.
  • SkyDroid
  • Decentralised app store.
  • Only open-source apps.
  • Fast updates.
  • Does not have a strict inclusion policy.
  • Aurora Store
  • Open-source frontend to download Google Play Store apps without an account.
  • Can spoof model and region of the device.
  • Relies on Google’s proprietary service.
  • Most apps will still contain trackers.
  • + +

    Other alternates are Obtanium and FossDroid.

    + +

    Cameras

    + +

    Stay away from preinstalled and third-party proprietary camera apps as they are known to collect user data.

    + +

    Following are some better alternates:

    + + + + + + + + + + + + + + + + + + + + + +
    AlternatesProspective AdvantagesConservative Disadvantages
    Libre Camera
  • Simple UI with automatic and manual controls.
  • Does not save EXIF by default.
  • Cannot customise resolution, frame rate.
  • OpenCamera Sensors
  • Geared towards advanced users.
  • Highly customisable with a lot of options.
  • Complex UI.
  • + +

    Another good alternate is AiCamera.

    + +

    Keyboards

    + +

    Stay away from preinstalled and third-party proprietary keyboards like GBoard, SwiftKey Keyboard, Samsung Keyboard, Mint Keyboard etc., as they are known to collect user data, including usage and clipboard data.

    + +

    Following are some better alternates:

    + + + + + + + + + + + + + + + + + + + + + +
    AlternatesProspective AdvantagesConservative Disadvantages
    OpenBoard
  • Based on Android Open-Source Program.
  • Supports basic customisations.
  • No swipe typing.
  • Advanced customisations not available.
  • FlorisBoard
  • Modern and user-friendly.
  • Highly customisable.
  • Currently, in early beta.
  • + +

    Other alternates are Indic Keyboard and AnySoftKeyboard.

    + +

    File Manager

    + +

    Stay away from preinstalled and third-party proprietary File Manager apps like EZ Explorer, FK Commander etc., as they are known to collect user data, including usage data and metadata.

    + +

    Following are some better alternates:

    + + + + + + + + + + + + + + + + + + +
    AlternatesFeatures
    Material Files
  • Follows Material Design guidelines, with attention into details.
  • View, extract and create common compressed files.
  • View and manage files on FTP, SFTP and SMB servers.
  • Ghost Commander
  • Ability to copy and move files between its two panels.
  • Full-featured app manager able to access extra info and share APKs.
  • Transfer files via FTP/SFTP/SMB.
  • + +

    Other alternates are Simple File Manager and Amaze File Manager.

    + +

    Operating Systems

    + +

    The choice of your operating system is very important as it is the most important piece of software on your device. And since it pretty much controls all your device’s hardware and software, it can have a significant impact on your privacy.

    + +

    Choosing operating systems like Stock Android, iOS, Windows, and macOS can compromise privacy as these systems often come with pre-installed apps and services that collect user data. These systems also often rely on cloud-based services that store user data, increasing the risk of data breaches and privacy violations. In addition, these systems are closed-source, which means that their source code is not available to the public, making it difficult to identify potential security vulnerabilities. Finally, these systems are typically designed to work with proprietary hardware, which can limit the user’s ability to control their data and their device.

    + +
    + +

    ELI5

    + +

    Imagine you have a secret toy that you do not want anyone else to know about. Your toy is hidden in a special place in your room where nobody can see it or touch it. Now, imagine that your parents can see everything you do in your room, even your secret hiding place. They can also tell your friends and other people about your toy.

    + +

    Just like your secret toy, your personal information on your device is also private, and you do not want anyone else to know about it. If you choose a privacy-oriented operating system, it will help you keep your personal information safe and hidden from others, just like your secret toy. But if you pick an operating system that does not prioritise privacy, it might share your personal information with others, just like your parents sharing about your toy with your friends.

    + +
    + +

    Mobile Operating Systems

    + +

    It is important to recognise that when it comes to iOS, privacy may not be a top priority for Apple as a company. Read these articles: 1, 2, 3.

    + +

    Similar to Apple, Google also collects and tracks your data on Android devices. When using an Android device, Google’s apps and services are integrated deeply within the system, allowing them to collect a vast amount of user data. Read these articles: 1, 2, 3.

    + +

    However, there are several custom ROMs available that remove Google’s presence, and provide additional security and privacy features for users. Following are some options:

    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ROMsProactive AdvantagesConservative Disadvantages
    LineageOS
  • Large number of supported devices and huge community support.
  • Highly customisable.
  • Regular monthly updates.
  • No bloatware but comes with a suite of basic FOSS apps.
  • Not all devices support bootloader relocking.
  • Buggy on some devices.
  • Only a few devices support LineageOS 20.
  • GrapheneOS
  • Hardened kernel for extra security.
  • Long term support.
  • Easy WebUSB-based installer.
  • Supports only Google Pixel devices.
  • /e/OS
  • Pre-installed tracker finder.
  • Includes an app store.
  • Inbuilt support for /e/Foundation cloud services (also self-hostable with complete integration).
  • Unstable on some devices.
  • Lack of huge community support as it is not well-known or widely adopted.
  • + +

    Please note that it is advisable to avoid rooting or flashing a custom ROM onto your device unless you possess advanced technical knowledge. If you still need an alternate, you may follow this Lemmy post – 100% FOSS Smartphone Hardening non-root Guide 4.0.

    + +

    Desktop Operating Systems

    + +

    Avoid using proprietary operating systems like Windows and macOS. They are known to be closed-source, which means that their source code is not open to the public. This makes it difficult to know what kind of data is being collected and how it is being used. In addition, they are also known to have several security vulnerabilities that can be exploited by hackers to gain access to your personal information.
    +Read these articles: 1, 2, 3, 4, 5.

    + +

    Following are some good, beginner-friendly alternates:

    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Operating SystemsProactive AdvantagesConservative Disadvantages
    Linux Mint
  • Geared towards beginners.
  • Adopts KISS (Keep It Simple, Stupid) principles.
  • Based on Ubuntu. Regular, stable updates.
  • Offers various desktop environments – Cinnamon, MATE, Xfce.
  • Fewer packages in official repositories compared to other popular Linux distributions.
  • Not suitable for advanced users who prefer more control and customisation options.
  • Manjaro
  • Based on Arch. Rolling release model.
  • Supports a lot of desktop environments.
  • Good for both – beginner and advanced users.
  • Delayed updates to ensure stability.
  • AUR can destabilise the system.
  • Edubuntu
  • Made for schools and students.
  • Huge ecosystem of free education software.
  • Better administration tools.
  • Recent update came after 9 years.
  • Not very customisable.
  • + +

    Following are some good alternative for advanced users:

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Operating SystemsProactive AdvantagesConservative Disadvantages
    OpenBSD
  • Strong focus of stability and security.
  • Only essential components included by default.
  • Clean and well-documented code.
  • Limited software and hardware support.
  • Steep learning curve.
  • Arch Linux
  • Arch Wiki provides comprehensive documentation.
  • Highly customisable.
  • Build your own system.
  • AUR support.
  • Can be complicated to install.
  • AUR can destabilise the system.
  • Tails
  • Boots only in live environment, leaving no trace in the computer.
  • Integrated with Tor.
  • Recommended for journalists and activists.
  • Limited functionality.
  • Slow performance.
  • Qubes OS
  • Security-oriented operating system.
  • Easily create disposable VMs.
  • Whonix integration.
  • High system requirements.
  • Limited hardware compatibility.
  • Time-consuming setup process.
  • + +

    There are a lot more options to choose from. If you need help picking a Linux-based operating system, Distrochooser is a very helpful tool.
    +If, for any reason, you have to rely on Microsoft Windows, you can debloat it and remove most of the telemetry using either AtlasOS or creating your own Tiny11 ISO using this guide, for a relatively safer experience.

    + +

    Smart TV Operating Systems

    + +

    Staying away from pre-installed OS on your Smart TV, like Google TV, WebOS etc., is a good idea. You can use the following for a safer experience:

    + + + +

    Smartwatch Operating Systems

    + +

    Health related data is the considered to be the most sensitive of all. Staying away from pre-installed OS on your smartwatches is a good idea. You can use the following for a safer experience:

    + + + +

    Download the operating systems from official sources only.

    + +

    Password Managers

    + +

    A password manager is a tool that securely stores your login information for websites and applications. With the prevalence of online accounts, it’s common for individuals to have dozens or even hundreds of different usernames and passwords to remember. Password managers alleviate the need to memorise multiple login credentials by providing a secure digital vault for storing them. This not only makes it easier to manage passwords, but it also improves security by allowing users to generate and store strong, unique passwords for each account.

    + +

    Although, most password managers offer built-in 2FA features, it is not recommended to use it because it, kind of, defeats the purpose of “two-factors” as both, passwords and 2FA codes are available in one app.

    + +

    People should avoid closed-source password managers, like 1Password, Dashlane, LastPass etc., because they cannot be audited or verified by the public, leaving users to rely on the company’s word that their passwords are being stored and managed securely. Closed-source password managers may also have backdoors or vulnerabilities that can be exploited by hackers or government agencies. Additionally, closed-source password managers may collect and sell user data without their knowledge or consent. Read these articles – 1, 2.

    + +

    Following are some good alternates:

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Password ManagerProactive AdvantagesConservative Disadvantages
    Bitwarden
  • Use company’s servers or self-host on your machine.
  • Supports FIDO U2F and YubiKey.
  • Multi-device support.
  • Additional features like Bitwarden Send.
  • Limited free support.
  • Self-hosted version is resource heavy.
  • Vaultwarden
  • Unofficial Bitwarden compatible server written in Rust
  • Works with all Bitwarden apps.
  • Self-hosting can be done on even a Raspberry Pi.
  • Only self-hosting option available.
  • Critical updates may be delayed.
  • KeePassXC (Linux/Windows/macOS)

    KeePassDX (Android)

    StrongBox (macOS/iOS)

    KeeWeb (WebApp)
  • Hardened, secure and offline password manager.
  • Highly customisable and configurable.
  • No reliance on third-party service or cloud storage.
  • Import from and export to various formats.
  • Active community of users and developers.
  • No built-in synchronisation.
  • Less user-friendly.
  • LessPass (Android/iOS/Browser Add-On/CLI)
  • Generates a password using a site, login, and a master password.
  • No synchronisation required.
  • Works offline.
  • New users may get intimidated.
  • Limited integration and customisability.
  • + +

    Some other good options are Padloc and Passbolt. For some users Proton Pass (Beta) may be a good option, but don’t keep all your apples in one basket.

    + +

    Privacy Analysers

    + +

    Privacy analysers are tools that scan applications on your device and identify privacy and security risks. They can help you identify apps that collect unnecessary data or have security vulnerabilities, giving you greater control over your online privacy. These tools are particularly important in today’s world, where many apps and services collect large amounts of user data without clear disclosure or user consent. By using a privacy analyser, you can identify problematic apps and take steps to protect your personal information.

    + +

    Following are some good analysers that you can use to aid your privacy:

    + + + + + + + + + + + + + + + + + + + + + + +
    ApplicationFeatures
    Exodus
  • The privacy audit platform for Android applications.
  • Provides a detailed report on the permission requirements and trackers found in apps on Google Play Store.
  • Pi-hole
  • Self-hosted, network-wide ad-blocking program.
  • Easy to install and configure, with a web interface for management.
  • Provides detailed logs and statistics on network traffic and blocked domains.
  • OpenWPM
  • Web privacy measurement framework which makes it easy to collect data for privacy studies.
  • Built on top of Firefox, with automation provided by Selenium.
  • + +

    Search Engines

    + +

    Stay away from search engines made by Big Tech companies who do not respect your privacy, like Google, Microsoft Bing etc.
    +Read these articles – 1, 2.

    + +

    Consider using the following alternates:

    + + + + + + + + + + + + + + + + + + +
    ApplicationFeatures
    SearxNG
  • Aggregates results from various search services and databases.
  • Self-hostable, but not recommended for single user.
  • Many public instances to choose from.
  • DuckDuckGo
  • Privacy respecting search engine and the company has good reputation.
  • No JavaScript version and onion link for Tor are also available.
  • Closed source backend.
  • + +

    There are many other good options you may want to look into, like Startpage, Qwant and Whoogle.

    + +

    Two-Factor Authentication

    + +

    You should always turn on 2FA whenever it is possible. Stay from SMS based 2FA and authenticator apps like Authy and Google Authenticator, that do not give the utmost importance to your privacy.

    + +

    Instead, consider using any of the following as your preferred 2FA app:

    + + + + + + + + + + + + + + + + + + + + + + +
    ApplicationFeatures
    Aegis (Android)
  • Simple UI with customisability.
  • Easily import from and export to various formats.
  • Tofu (iOS)
  • Designed specifically for iOS.
  • Apple Keychain integration.
  • Gnome Authenticator (Linux)
  • User-friendly and secure.
  • Easily import from and export to various formats.
  • + +

    Some other good alternates are ente Auth, WinAuth, Authenticator Pro and Owky. Most password managers support generating 2FA codes, but it is not recommended to use a single app as both – a password manager and a 2FA code generator.

    + +

    Virtual Private Networks (VPNs)

    + +

    While many people think of VPNs as tools for hiding their IP address and encrypting internet traffic, VPNs can also serve a variety of other purposes. For instance, businesses often use VPNs to connect remote employees to their company’s network securely. This allows employees to access important files and resources from anywhere in the world without compromising security. In addition, VPNs can be used to create mesh networks that allow multiple devices to connect and communicate directly with each other. This is especially useful in disaster relief scenarios, where traditional communication infrastructure may be damaged or destroyed. By using VPN technology to establish a mesh network, first responders are able to coordinate more effectively and respond to emergencies more efficiently.

    + +

    To put it simply, a VPN is much more than just an IP hiding app. It’s a powerful tool that can be used in a variety of settings to solve a wide range of problems. Whether you’re a remote worker who needs to connect to your company’s network securely, or a first responder who needs to communicate effectively in a disaster zone, a VPN can help you stay connected and protected.

    + +

    If you are using applications and protocols like Hamachi, NetCloud by Cradlepoint, Cisco’s L2F and L2TP, Apple’s SSTP etc., in your business environment or even at home, then shifting to an open source alternative is a good idea. Following are some good options:

    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ApplicationFeatures
    Tailscale
  • Based on WireGuard.
  • Incredibly easy to set up and use.
  • Free plan available.
  • Closed source coordination server.
  • Headscale
  • Open source implementation of Tailscale’s coordination/control server.
  • Requires setting up of a server.
  • strongSwan
  • Open-source, modular and portable IPsec-based VPN solution.
  • Requires setting up your own server.
  • PiVPN
  • Can use OpenVPN and WireGuard.
  • Designed for Raspberry Pi, but can be used on multiple types of hardware.
  • The simplest and fastest way to install and set up a VPN server.
  • + +

    Some other solutions that you may want to look at are SoftEtherVPN and ZeroTier.

    + +

    As you already know, a VPN can also provide some form of online privacy and can help with geo-blocked content on the internet, but choosing a bad VPN provider can make things worse. For example, the free VPN apps on Google Play Store are a bad idea, as they make money by selling your data to third-parties.

    + +

    Following are some reputed VPN providers in the privacy community:

    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ApplicationFeatures
    Mullvad
  • Flat rate of €5/month.
  • About 667 severs in 43 countries.
  • Accepts cryptocurrencies, including Monero.
  • ProtonVPN
  • Multiple plans, including a free plan with limited features.
  • About 2,978 servers (65 free) in 68 countries.
  • Accepts Bitcoin.
  • IVPN
  • About 86 servers in 36 countries.
  • Cash, Monero and Bitcoin payment options for better anonymity.
  • Xeovo VPN
  • 16 locations, 31 servers, and growing.
  • Accepts Monero and Bitcoin.
  • + +

    Some other privacy focused VPN providers are RiseupVPN, AirVPN and AzireVPN.

    + +

    Please note, that setting up your own VPN may not be a very good idea, especially if you are the only individual using it. A personal VPN server on a VPS can prevent your ISP from tracking and logging the sites you visit, and is a better option than using an untrustworthy VPN provider. But online service providers will be able to track you and make a detailed profile about you since you are the only one connecting to their servers using your VPS’s IP address.

    + +

    Web Browsers

    + +

    It is a good idea to avoid closed source, proprietary browsers, like Google Chrome, Microsoft Edge, Opera etc., as they tend to collect a lot of user data. Read this study. There are many good, privacy focused alternatives, that will provide you with a much better experience.

    + +

    Desktop Web Browsers

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Web BrowsersProactive AdvantagesConservative Disadvantages
    Mozilla Firefox
  • Free and open-source, backed by a not-for-profit organisation.
  • Highly customisable.
  • Large number of available add-ons.
  • Little to no privacy with default settings. Requires hardening. (More info below the table.)
  • Sends telemetry by default.
  • Bad company reputation due to high salary of the CEO.
  • LibreWolf
  • A fork of Firefox, which is FOSS.
  • Hardened by default.
  • Updates can get delayed, as it is based on Firefox.
  • Hardening can break some websites.
  • Brave
  • Privacy-focused browser.
  • Blocks most ads and trackers by default.
  • Based on Chromium, which is developed mainly by Google.
  • Bad reputation among many privacy-enthusiasts.
  • Tor Browser
  • Based on Firefox.
  • Routes all the traffic through Tor.
  • Can access .onion domains.
  • Many websites block Tor servers, which may affect your browsing experience.
  • + +

    Other good options are Un-googled Chromium, Mullvad Browser and Privacy Browser.

    + +

    To harden Firefox and its forks, you can check out arkenfox/user.js, Firefox Profile Maker or ArchWiki Guide. There are plenty of other tutorials/guides as well.

    + +

    Mobile Web Browsers

    + +

    All third-party web browsers on iOS are just Safari in disguise. The following list contains browser suggestions for Android devices only.

    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Web BrowsersFeatures
    Mull
  • Based on Firefox.
  • Hardened and telemetry is removed.
  • Many add-ons are available.
  • Bromite
  • Based on Chromium.
  • Hardened by default.
  • Possibly, an abandoned project. (Last updated in January 2023.)
  • Brave
  • Based on Chromium.
  • Blocks most ads and trackers by default.
  • Tor Browser
  • Based on Firefox.
  • Routes all the traffic through Tor.
  • Can access .onion domains.
  • + +

    Another good option is Privacy Browser.

    + +

    It is a good idea to keep JavaScript turned off in your browser, unless you really, really need it. NoScript is a browser add-on that lets you control it easily.

    + +

    2. Communication and Social

    + +

    Using proprietary apps and protocols for social media and communication/messaging can potentially harm users’ privacy in several ways. Data collection, lack of transparency, third-party sharing, invasive permissions, backdoors and vulnerabilities, lack of end-to-end encryption, vendor lock-in, monetisation of user data, limited user control, lack of accountability etc. are a few concerns.

    + +

    Dating Apps

    + +

    Dating apps often collect a wide range of personal information, including your location, age, gender, sexual orientation, and even your preferences. This data can be used to build detailed profiles of users, potentially revealing sensitive and private information. They share user data with third-party companies for advertising and marketing purposes. This can lead to the creation of comprehensive user profiles, which are then used for targeted ads or sold to other companies. They typically use location data to match users with potential partners. While this is essential for their functionality, it also means that your movements and routines can be tracked, potentially compromising your privacy. Dating apps use complex algorithms to recommend potential matches. These algorithms may take into account your behaviour on the app, preferences, and interactions. While they aim to improve user experiences, they can also be used to predict user behaviour and target them with specific content or ads.

    + +

    Like any online platform, dating apps are vulnerable to data breaches and cyberattacks. If these companies do not have robust security measures in place, user data could be exposed to hackers. In some cases, dating apps have faced legal action and investigations over their data practices. Users may not always be aware of how their data is being used or shared.

    + +

    Read these articles – 1, 2, 3.

    + +

    Consider avoiding proprietary apps like Tinder, OKCupid etc.

    + +

    Alovoa is a privacy respecting, free and open-source alternate to these services. As sensitive data is heavily encrypted, it will be safe even if a data breach were to occur.

    + +

    Instant Messaging

    + +

    Mail Services

    + +

    Social Networks and Platforms

    + +

    3. Productivity Tools

    + +

    Analytics

    + +

    Animation

    + +

    Bookmarking

    + +

    Commenting Engines

    + +

    Cloud Storage

    + +

    File Management and Sharing

    + +

    Fonts

    + +

    Forms

    + + + + + +

    Maps and Navigation

    + +

    Notes and Tasks

    + +

    Office Suite

    + +

    Pastebin and Secret Sharing

    + +

    Photo Editing and Management

    + +

    Remote Access and Control

    + +

    Team-working Tools

    + +

    Translation and Speech-to-Text

    + +

    Video and Audio Conferencing

    + +

    Video Editing

    + +

    4. Security

    + +

    Cloaking

    + +

    Encryption

    + +

    Intrusion Prevention

    + +

    5. Entertainment

    + +

    Games

    + +

    Media Streaming Platforms

    + +

    Music Recognition

    + +

    6. Personal

    + +

    Fitness and Health

    + +

    Home Assistants

    + +

    Location Tracking

    + +

    Finance Management

    + +

    Photo Storage

    + +

    7. Advanced

    + +

    Captchas

    + +

    Databases

    + +

    Developer Tools

    + +

    Online Phone Number Providers

    + +

    Payments

    + +

    Bobby must be madd.

    + + + +
    +
    +
    +

    Comments

    + + +
    +
    + + +
    +

    Recent Posts

    +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or...

    +

    Read More

    +
    +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + diff --git a/bypass-cgnat.html b/bypass-cgnat.html new file mode 100644 index 0000000..c0098e5 --- /dev/null +++ b/bypass-cgnat.html @@ -0,0 +1,443 @@ + + + + How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    + A view of server racks with a text overlay reading “Bpass CGNAT - Privactely Expose Services Hosted on Your Homeserver”. + + +

    Disclaimer

    +

    Exposing your home server to the internet can be dangerous. Look up some online guides about securing your servers before you do anything stupid. You have been warned. Also, I have not included any instructions related to SELinux.

    + +

    Contents

    + +
      +
    1. Introduction + +
    2. +
    3. Prerequisites
    4. +
    5. Preparing the servers + +
    6. +
    7. Testing and finalising the WireGuard connection
    8. +
    9. Optional configuration of home server + +
    10. +
    11. References
    12. +
    + +

    Introduction

    + +

    You’ve set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it with friends and family, or maybe you just need the ability to access it remotely. So, you decided to expose it to the internet, but your ISP does not let you do that. Issues like dynamic IP can be resolved using a service like Duck DNS or No-IP, but if your ISP does not let you forward your ports, then you have to rely on third-parties to forward your traffic.

    + +

    Easy Solutions

    + +

    There are many easy solutions to this problem. Cloudflare Tunnel is a free and popular solution. And if you just want remote access, Tailscale is another good option. If Tailscale’s backend servers are not being open-source is an issue, people can rely on Headscale.

    + +

    But there is something you must know before considering these solutions. All these rely on TLS/SSL termination, which means your data is decrypted in the servers owned by these third parties.

    + +

    Let me explain this in detail with taking Cloudflare Tunnel as an example.

    + +

    One of the reasons we use SSL certificates on our websites to ensure that when the client requests data from the servers, or sends any data back to us, nobody else can look at that it, ensuring the client’s privacy. When we use Cloudflare Tunnel, the data may be encrypted on our server, but it is decrypted on Cloudflare’s servers, then re-encrypted and sent to the client. And when client enters any data like passwords, or upload any image, that data is, again, decrypted on Cloudflare’s servers (e2ee services are different, discussed below), then re-encrypted and sent back to us.

    + +

    If you set up a Let’s Encrypt certificate on your server and route your traffic through a Cloudflare Tunnel, your clients will see a Cloudflare certificate. If you want them to see your Let’s Encrypt certificate, you will have to subscribe to their Business or Enterprise plan.

    + +

    Take a look at this diagram for better understanding:

    + +

    Diag

    + +
    + +

    ELI5

    + +

    Let’s say you want to send your friend a message, but you don’t want anyone else to read it while in transit. So, you put the message in a locked box. So, if the box gets stolen on the way others won’t be able to read the message. That is what SSL certificates do.

    + +

    But, let’s say you cannot go out of your house to deliver the box yourself, because your parents, that is, your ISP, won’t let you. So, you hire someone else, say, Cloudflare. But what Cloudflare says, is that they will look inside the box before if you want them to deliver it for free, If you want the box locked, you will have to pay them money.

    + +

    There are some applications, like Vaultwarden, and Nextcloud with end-to-end encryption plugin, that are not affected with this because they encrypt the data themselves in the clients’ devices, using their own algorithms.

    + +
    + +

    My solution

    + +

    Earlier, I used to do the same thing, but manually. I rented a VPS on Hetzner and connected it to my home server using WireGuard. But since, the certificate management was handled by the VPS using Nginx Proxy Manager my VPS provider, Hetzner, could look at the data. So, I decided to learn about implementing TLS passthrough.

    + +

    Now, my current setup is – I host services on my home server, manage certificates locally, and use the VPS to pass the data to the client without terminating the TLS/SSL connection.

    + +

    Here is a diagram to explain my setup:

    + +

    Diag

    + +

    Prerequisites

    + +

    If you have looked at the diagram above, you may have already understood what you need to replicate my setup. Here are the details:

    + + + +

    Preparing the servers

    + +

    I am assuming you have already updated and secured both of your machines and have access to both using ssh or dropbear.

    + +

    First, let’s install WireGuard on both.

    + +

    Debian/Ubuntu

    +
    sudo apt install wireguard
    +
    + +

    Fedora

    +
    sudo dnf install wireguard-tools
    +
    + +

    Arch

    +
    sudo pacman -S wireguard-tools
    +
    + +

    For instructions to install WireGuard on other distributions, visit the official documentation.

    + +

    On both servers, make sure forwarding is enabled. +Run

    +
    sudo nano /etc/sysctl.conf
    +
    + +

    Make sure net.ipv4.ip_forward=1 is present. If it is not, type it at the end of the file. It might also be the case that it is present but has a pound sign (#) at the start of the line. This means that it is commented, and not enabled. Removing the sign will enable it.

    + +

    Tip – If the file is too big, and you cannot find this line, you can press ctrl + w to find it.

    + +

    Save and close the file by pressing ctrl + x, then y, and then enter. If you have not made any changes to the file, pressing ctrl + x will simply close the file.

    + +

    If you made any changes to the file, run the following command:

    +
    sudo sysctl -p
    +
    + +

    Setting up the VPS

    + +

    On most distributions, iptables comes pre-installed. But if, for any reason, it is not, install it using your system’s default package manager.

    + +
    Debian/Ubuntu
    +
    sudo apt install iptables
    +
    + +
    Fedora
    +
    sudo dnf install iptables-services
    +
    + +
    Arch
    +
    sudo pacman -S iptables
    +
    + +

    For other distributions, a quick search on your favourite search engine will fetch you the instructions.

    + +

    You may have to start the iptables service.

    +
    sudo systemctl enable iptables.service
    +sudo systemctl start iptables.service
    +
    + +

    Now, let us set up WireGuard. The basic idea is, the both servers will generate a pair of private and public keys. The WireGuard configuration files on both servers will contain their own private key and each other’s public key. There are many ways of doing it, but I find this way to be the easiest.

    + +

    Run the following commands:

    +
    wg genkey | sudo tee /etc/wireguard/private.key
    +sudo chmod go= /etc/wireguard/private.key
    +sudo cat /etc/wireguard/private.key | wg pubkey | sudo tee /etc/wireguard/public.key
    +
    +

    The first command generates the private key of the VPS, and it will be saved in a specific location. The second command removes any permissions on the file for users and groups other than the root user to ensure that only it can access the private key. And the third command generates the public key of the VPS, and it will be saved in the same location as the private key.

    + +

    Now, create a new wireguard configuration file using

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    + +

    Insert these lines:

    +
    [Interface]
    +Address = 10.0.0.1/24
    +ListenPort = 51820
    +PrivateKey = 
    +
    +PostUp = iptables -t nat -A PREROUTING -p tcp -i eth0 '!' --dport 22 -j DNAT --to-destination 10.0.0.2; iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source SERVER-IP
    +PostUp = iptables -t nat -A PREROUTING -p udp -i eth0 '!' --dport 55107 -j DNAT --to-destination 10.0.0.2;
    +
    +PostDown = iptables -t nat -D PREROUTING -p tcp -i eth0 '!' --dport 22 -j DNAT --to-destination 10.0.0.2; iptables -t nat -D POSTROUTING -o eth0 -j SNAT --to-source SERVER-IP
    +PostDown = iptables -t nat -D PREROUTING -p udp -i eth0 '!' --dport 55107 -j DNAT --to-destination 10.0.0.2;
    +
    +[Peer]
    +PublicKey = 
    +AllowedIPs = 10.0.0.2/32
    +
    + +

    Replace the SERVER-IP, at the end of those lines, with the public IP address of your VPS. For now, we will keep the PrivateKey and PublicKey empty.

    + +

    Press ctrl +x, then y, and then enter, to save the configuration file.

    + +

    Setting up your home server

    + +

    Run the same commands as we did on the VPS to generate public and private keys.

    +
    wg genkey | sudo tee /etc/wireguard/private.key
    +sudo chmod go= /etc/wireguard/private.key
    +sudo cat /etc/wireguard/private.key | wg pubkey | sudo tee /etc/wireguard/public.key
    +
    + +

    Create a new wireguard configuration file using

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    + +

    Insert these lines:

    +
    [Interface]
    +Address = 10.0.0.2/24
    +PrivateKey = 
    + 
    +[Peer]
    +PublicKey = 
    +AllowedIPs = 0.0.0.0/0
    +PersistentKeepalive = 25
    +Endpoint = X.X.X.X:51820
    +
    + +

    Replace X.X.X.X with the public IP address of your VPS. So, the last line should look like this:

    +
    Endpoint = 42.11.109.1:51820
    +
    + +

    Press ctrl +x, then y, and then enter, to save the configuration file.

    + +

    Now, we will insert the public and private keys in the config files. We will have to go back and forth in your home server and the VPS to print keys and change the configuration files.

    + +

    On your home server, run

    +
    sudo cat /etc/wireguard/private.key
    +
    +

    This will print out the private key. Copy it. Now open the config file using

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    +

    Paste the copied key in front of the PrivateKey =. +The line should look like this:

    +
    PrivateKey = U9uE2kb/nrrzsEU58GD3pKFU3TLYDMCbetIsnV8eeFE=
    +
    +

    Save and exit.

    + +

    Now, run

    +
    sudo cat /etc/wireguard/public.key
    +
    +

    This will print the public key of your home server. Copy it.

    + +

    Return to the VPS and run

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    +

    Paste the copied key in front of the PublicKey =. Then, save and exit.

    + +

    Run

    +
    sudo cat /etc/wireguard/private.key
    +
    +

    This will print out the private key. Copy it. Now open the config file using

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    +

    Paste the copied key in front of the PrivateKey =. Now, save and exit.

    + +

    Run

    +
    sudo cat /etc/wireguard/public.key
    +
    +

    This will print the public key of the VPS. Copy it.

    + +

    Go back to your home server and run

    +
    sudo nano /etc/wireguard/wg0.conf
    +
    +

    Paste the copied key in front of the PublicKey =. Then, save and exit.

    + +

    Finally, run the following command on both of the server to start WireGuard:

    +
    sudo wg-quick up wg0
    +
    + +

    Testing and finalising the WireGuard connection

    + +

    You can test the connection by pinging the WireGuard IP from either of the servers.

    + +

    On your VPS, run

    +
    ping 10.0.0.2
    +
    +

    Press ctrl + c to stop. +If what you see is something like in the following screenshot, then your configuration is okay and everything should be routed through the VPS.

    + +

    screenshot

    + +

    If you have any issues, feel free to post a comment, below.

    + +

    To make sure that WireGuard is turned on automatically after reboot, run the following command on both the systems:

    +
    sudo systemctl enable wg-quick@wg0
    +
    + +

    Now, you can point your domain(s) and/or subdomains to the public IP address of your VPS.

    + +

    Optional configuration of home server

    + +

    HAProxy

    +

    For a reverse proxy, any solution would work. But personally, I shifted from Nginx Proxy Manager to HAProxy because, In my opinion, it is faster, lightweight and provides more control.

    + +

    To install HAProxy, use your default package manager.

    + +

    Debian/Ubuntu

    +
    sudo apt install haproxy
    +
    + +

    Fedora

    +
    sudo dnf install haproxy
    +
    + +

    Arch

    +
    sudo pacman -S haproxy
    +
    + +

    For instructions to install a more recent version, or to install on other distributions, use your favourite search engine.

    + +

    Start the HAProxy service, and enable it to ensure it is started after every boot, using the following command:

    +
    sudo systemctl start haproxy
    +sudo systemctl enable haproxy
    +
    + +

    To configure haproxy. Use

    +
    sudo nano /etc/haproxy/haproxy.cfg
    +
    + +

    Here is what my configuration looks like.

    + +

    To enable the changes after editing the configuration file, we must restart the HAProxy service.

    +
    sudo systemctl restart haproxy
    +
    + +

    If you are using my config file, you will see that I have added a location for an SSL certificate. If you restart the service without providing a valid SSL certificate, it will throw an error and the service will stop.

    + +

    Now, let us jump to generating an SSL certificate.

    + +

    Certbot

    + +

    The official documentation states that you must install certbot using Snap package manager. I do not like it at all due to its back-end being proprietary. I used my distibution’s (Fedora’s) package manager to install certbot and it works fine. So, I leave the installtion of certbot to you.

    + +

    There are many ways to generate a certbot certificate, depending upon your requirements. I recommend setting up a wildcard certificate. You will need your domain provider’s API key. A simple search on your search engine will help you find a decent guide. Generate a certificate using certbot certonly command, as we are going to set up HAProxy with the certificate ourselves.

    + +

    Certbot will generate a private key and a public key certificate in /etc/letsencrypt/live/YOURDOMAIN.COM folder. We will have to pipe both of them into a single file.

    + +

    Run the following commands, after replacing YOURDOMAIN.COM with your actual domain and providing a proper path to certificate:

    +
    sudo cat /etc/letsencrypt/live/YOURDOMAIN.COM/fullchain.pem /etc/letsencrypt/live/YOURDOMAIN.COM/privkey.pem | sudo tee /path/to/certificate.pem
    +
    + +

    After making sure that certbot will be autorenewing your certificate, you can add this command in your root user’s crontab. Run the following to create a new cronjob: +sudo crontab -e

    + +

    Add the above command with proper syntax. Add

    +
    0 22 * * * sudo cat /etc/letsencrypt/live/YOURDOMAIN.COM/fullchain.pem /etc/letsencrypt/live/YOURDOMAIN.COM/privkey.pem | sudo tee /path/to/certificate.pem
    +
    +

    This will copy the generated keys into your single certificate file, everyday at 10 PM.

    + +

    Save the file and exit the editor.

    + +

    Confirm the certificate path in your haproxy.cfg, and restart HAProxy using

    +
    sudo systemctl restart haproxy
    +
    + +

    That is it. You are done. Whenever you create new services, make sure you update your HAProxy configuration file and restart the HAProxy service.

    + +

    Although, you do not have to touch your VPS anymore, I still recommend loging into the machine updating and rebooting it regularly.

    + +

    If you have any questions, or suggestions, leave a comment down below, or reach out to me directly.

    + +

    References

    + + + + + +
    +
    +
    +

    Comments

    + + +
    +
    + + +
    +

    Recent Posts

    +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or...

    +

    Read More

    +
    +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + diff --git a/index.html b/index.html new file mode 100644 index 0000000..cf4b257 --- /dev/null +++ b/index.html @@ -0,0 +1,146 @@ + + + + Aiquiral's Blog | Posting What I Learn + + + + + + + +
    +
    + +
    +
    +
    +
    +

    Latest

    + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it with friends and family, or maybe you just need the ability to access it remotely. So, you decided to expose it to the internet, but your ISP does not let you do that. Issues like dynamic IP can be resolved using a service like Duck DNS or No-IP, but if your ISP does not let you forward your ports, then you have to rely on third-parties to forward your traffic.

    +

    Read More

    +
    +
    + +

    Categories

    + +
    +
    +
    +
    + +
    +
    +

    ABOUT THE AUTHOR

    +

    Anuj Kaushik

    +

    During my journey of learning about self-hosting, I became increasingly aware of the privacy issues in our society. As a result, I've been removing proprietary software, services and hardware from my life. On my blog, I share tutorials, guides and configurations for others looking to do the same.

    +   +
    Read more
    +
    +
    +
    +

    All Posts

    + +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + diff --git a/linux-guide.html b/linux-guide.html new file mode 100644 index 0000000..cc3fbfb --- /dev/null +++ b/linux-guide.html @@ -0,0 +1,87 @@ + + + + Category - Linux Guide | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +
    +

    Category - Linux Guide

    + + + + + + + +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + +
    + + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or...

    +

    Read More

    +
    +
    + +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    + + + +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + \ No newline at end of file diff --git a/privacy.html b/privacy.html new file mode 100644 index 0000000..4c64246 --- /dev/null +++ b/privacy.html @@ -0,0 +1,87 @@ + + + + Category - Privacy | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +
    +

    Category - Privacy

    + + + +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    + +
    + + +

    Awesome Privacy

    +

    26 April 2023 | Privacy, Self-hosting

    +

    (UNDER CONSTRUCTION) A list dedicated to providing the best tools and services to protect your online privacy.

    +

    Read More

    +
    +
    + + + + + + + +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + \ No newline at end of file diff --git a/proton-vpn-linux-guide.html b/proton-vpn-linux-guide.html new file mode 100644 index 0000000..a89f06d --- /dev/null +++ b/proton-vpn-linux-guide.html @@ -0,0 +1,322 @@ + + + + Proton VPN Linux Guide – How to install, configure, use and auto-connect? | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    + Proton VPN - Linux Guide - Install, Configure, Use & Auto-Connect + + +

    Content

    + +
      +
    1. Introduction
    2. +
    3. Installing + +
    4. +
    5. +

      Configuring and using

      + +
        +
      1. Login and basic configuration
      2. +
      3. Advanced configuration
      4. +
      5. Connecting to the VPN servers
      6. +
      +
    6. +
    7. Setting up auto-connect on boot
    8. +
    9. Other options
    10. +
    11. References
    12. +
    + +

    Introduction

    + +

    It is widely known that the Proton team does not focus on Linux users as much as they focus on Windows and macOS users. The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific country, enabling their VPN Accelerator etc.

    + +

    However, we can achieve a lot using their official CLI client. And yes, that is what we are going to use. No third-party applications.

    + +

    Installing the official Linux CLI

    + +

    Debian

    + +

    Get the Proton VPN repository setup DEB package:

    + +
    wget https://repo.protonvpn.com/debian/dists/stable/main/binary-all/protonvpn-stable-release_1.0.3_all.deb
    +
    + +

    Install the Proton VPN repository:

    + +
    sudo apt-get install ./protonvpn-stable-release_1.0.3_all.deb
    +
    + +

    Update the apt-get package list:

    + +
    sudo apt-get update
    +
    + +

    Install the Proton VPN Linux CLI:

    + +
    sudo apt-get install protonvpn-cli
    +
    + +

    Fedora 35+

    + +

    Get the Proton VPN repository setup RPM package:

    + +
    wget https://protonvpn.com/download/protonvpn-stable-release-1.0.1-1.noarch.rpm
    +
    + +

    Install the Proton VPN repository:

    + +
    sudo dnf install ./protonvpn-stable-release-1.0.1-1.noarch.rpm
    +
    + +

    Update the dnf package list:

    + +
    sudo dnf update
    +
    + +

    Install the Proton VPN Linux CLI:

    + +
    sudo dnf install protonvpn-cli
    +
    + +

    Install required dependencies for the alternative routing feature:

    + +
    sudo dnf install python3-pip
    +pip3 install --user 'dnspython>=1.16.0
    +
    + +

    Arch

    + +

    Update your local repository:

    + +
    pamac update --force-refresh
    +
    + +

    Verify that Proton VPN is now in your local repository:

    + +
    pamac search --aur protonvpn-cli
    +
    + +

    Build and install Proton VPN:

    + +
    pamac build protonvpn-cli
    +
    + +

    Note - Visit the Proton VPN’s official documentation page if you get any errors or need detailed instructions.

    + +

    Configuring and using the CLI tool

    + +

    Terminal screenshot with the command "protonvpn-cli --help".

    + +

    Login and basic configuration

    + +

    To log in, use this command and follow the on-screen instructions:

    + +
    protonvpn-cli login
    +
    + +

    Turn on VPN Accelerator:

    + +
    protonvpn-cli config --vpn-accelerator enable
    +
    + +

    Turn on NetShield to block ads and malware:

    + +
    protonvpn-cli ns --ads-malware
    +
    + +

    Change default connection protocol to TCP:

    + +
    protonvpn-cli config -p tcp
    +
    + +

    Advanced configuration

    + +

    Change DNS configuration:

    + +
    protonvpn-cli config --dns custom --ip 9.9.9.9
    +
    + +

    You can add upto 3 IPs, or leave it at automatic by using this command:

    + +
    protonvpn-cli config --dns automatic
    +
    + +

    Turn on alternative routing to circumvent censorship:

    + +
    protonvpn-cli config --alt-routing enable
    +
    + +

    Turn on the Kill Switch:

    + +
    protonvpn-cli ks --on
    +
    +

    or

    +
    protonvpn-cli ks --permanent
    +
    + +

    For more configuration options, use:

    + +
    protonvpn-cli --help
    +
    +

    and

    +
    protonvpn-cli config --help
    +
    + +

    Connecting to the VPN servers

    + +

    To manually select the country and the server to connect to, use the following command and follow the on-screen instructions:

    + +
    protonvpn-cli c
    +
    + +

    To connect to the fastest Proton VPN server for your location, for example, enter:

    + +
    protonvpn-cli c -f
    +
    + +

    To connect to the fastest Tor server, enter:

    + +
    protonvpn-cli c --tor
    +
    + +

    To connect to the fastest server in a specific country, a country code can be used. For example, the following command connects to the fastest server in Germany using TCP:

    + +
    protonvpn-cli c --cc DE -p TCP
    +
    + +

    Setting up auto-connect at boot

    + +

    The following method is tested on Debian 11 with Xfce, Fedora 38 Workstation with Gnome and Manjaro 22.1.1 with KDE.

    + +

    Go to the autostart folder in your home directory which contains all your application shortcuts that start immediately after login:

    + +
    cd ~/.config/autostart
    +
    + +

    Create a new file:

    + +
    nano pvpn.desktop
    +
    + +

    Paste the following:

    + +
    [Desktop Entry]
    +Exec=protonvpn-cli c -f
    +Name=ProtonVPN Autoconnect
    +Comment=Autoconnect to the fastest server
    +Type=Application
    +Icon=protonvpn-logo
    +
    + +

    Change the “Exec” value according to your needs. For example, use

    +
    protonvpn-cli c --cc DE -p TCP
    +
    +

    to connect to the fastest server in Germany using the TCP protocol. Save the file by hitting Ctrl + X, then Y, and then Enter.

    + +

    Test this by logging out and then logging back in. Or just restart the whole system. If everything went perfectly, you should be automatically connected to the VPN when you log in.

    + +

    If due to some reason you are not automatically connected, change the “Exec” value to:

    + +
    Exec=bash -c "sleep 10 && protonvpn-cli c -f"
    +
    + +

    This will delay the command execution by ten seconds.

    + +

    Other options

    + +

    There are other options:

    + + + +

    References

    + + + + + +
    +
    +
    +

    Comments

    + + +
    +
    + + +
    +

    Recent Posts

    +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or...

    +

    Read More

    +
    +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + diff --git a/remap-keyboard-keys-using-evremap.html b/remap-keyboard-keys-using-evremap.html new file mode 100644 index 0000000..6bdf3b4 --- /dev/null +++ b/remap-keyboard-keys-using-evremap.html @@ -0,0 +1,236 @@ + + + + Remap keyboard keys using evremap | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    + A close-up view of a purple backlit keyboard with a transparent text overlay reading “evremap”. + + +

    Content

    + +
      +
    1. Introduction
    2. +
    3. +

      Building and Installing

      + +
        +
      1. Prerequisites
      2. +
      3. Building
      4. +
      5. Installing
      6. +
      +
    4. +
    5. Usage
    6. +
    7. Other Options
    8. +
    9. References
    10. +
    + +

    Introduction

    + +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or maybe you just want to change how your keyboard keys work to improve your workflow. All this, and more, can be done with the help of evremap (github.com/wez/evremap).

    + +

    It is a tool that can remap the keyboard inputs for Linux systems, made by Wez. And because evremap targets the evdev layer of libinput, the remapping is effective system-wide – in Wayland, X11 and the Linux console.

    + +

    Building and Installing

    + +

    Prerequisites

    + +

    Debian and its derivatives like Ubuntu require some prerequisites before we can build it. Use this command to install them:

    + +
    sudo apt install git cargo pkg-config libevdev-dev
    +
    + +

    RHEL and its derivates also require some prerequisites. Use the following command to install it:

    + +
    sudo dnf install git libevdev-devel
    +
    + +

    Building

    + +

    First, clone the repository to any folder of your choice. I recommend the Downloads folder, as after building it, you can safely delete it.

    + +
    cd ~/Downloads && git clone https://github.com/wez/evremap.git && cd evremap
    +
    + +

    Now, build the binary.

    + +
    cargo build --release
    +
    + +

    If everything went fine, the last lines of your terminal output should be something like the ones in the image below.

    + +

    A screenshot of the terminal after evremap finished building.

    + +

    Installing

    + +

    Copy the binary file to the specified location using this command:

    + +
    sudo cp target/release/evremap /usr/bin/
    +
    + +

    Now create a config file in the specified location using this command:

    + +
    sudo touch /etc/evremap.toml
    +
    + +

    We will edit this file in the Usage section, below.To make your configured remapping active immediately after the system startup we need to create a systemd service. Use the following commands to do so:

    + +
    sudo cp evremap.service /usr/lib/systemd/system/
    +sudo systemctl daemon-reload
    +sudo systemctl enable evremap.service
    +sudo systemctl start evremap.service
    +
    + +

    Now, you can safely delete the cloned repository.

    + +
    cd .. && rm -rf evremap
    +
    + +

    Usage

    + +

    In the configuration file, we need to state two things, basically – name of the keyboard(s) and name of the keys you wish to remap.

    + +

    To find the name of all the connected keyboards use the following command:

    +
    sudo evremap list-devices
    +
    + +

    Usually, laptop keyboards will be named “AT Translated Set 2 keyboard”.

    + +

    To find the name of all the inputs use:

    + +
    sudo evremap list-keys
    +
    + +

    The grep command can help you find the keyboards and the keys faster.

    + +

    For example:

    + +
    sudo evremap list-devices | grep HOME
    +
    + +

    Now, let us modify the configuration file. Use the following command to edit it:

    + +
    sudo nano /etc/evremap.toml
    +
    + +

    Here is a template that you can copy and paste, and make te changes you need:

    + +
    device_name = "DEVICE NAME HERE"
    +
    +[[remap]]
    +input = ["NAME_OF_THE_KEY_YOU_WILL_PRESS_ON_YOUR_KEYBOARD"]
    +output = ["NAME_OF_THE_KEY_YOU_NEED_TO_BE_PRESS_AS_THE_OUTPUT"]
    +
    +[[remap]]
    +input = ["KEY_COMBINATION_1", "KEY_COMBINATION_2"]
    +output = ["OUTPUT_KEY"]
    +
    +[[dual_role]]
    +input = "KEY_YOU_NEED_TO_CHANGE_THE_RESULT_FOR"
    +hold = ["KEY_THAT_WILL_BE_PRESSED_WHEN_INPUT_KEY_IS_HELD"]
    +tap = ["KEY_THAT_WILL_BE_PRESSED_WHEN_INPUT_KEY_IS_TAPPED"]
    +
    + +

    Here is the configuration file that I use for my laptop, as my Tab and Number 2 keys do not work.

    + +
    device_name = "AT Translated Set 2 keyboard"
    +
    +[[remap]]
    +input = ["KEY_END"] output = ["KEY_2"]
    +
    +[[remap]]
    +input = ["KEY_HOME"]
    +output = ["KEY_TAB"]
    +
    + +

    You can save the file by hitting CTRL + X, then Y and then Enter.

    + +

    Now, you can log out and log back in and test your new configuration. If everything went perfectly, your remapped keys should work as expected.

    + +

    Please visit the official repository on GitHub if you have any questions or need a detailed documentation.

    + +

    Other Options

    + +

    There is a tool called xmodmap, but it works only on X11.

    + +

    References

    + + + + + +
    +
    +
    +

    Comments

    + + +
    +
    + + +
    +

    Recent Posts

    +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + + +

    Remap keyboard keys using evremap

    +

    21 May 2023 | Linux Guide

    +

    Sometimes a key on your keyboard stops working, and you may not have the time or motivation to fix it or get it fixed. Or...

    +

    Read More

    +
    +
    + + +

    Proton VPN Linux Guide – How to install, configure, use and auto-connect?

    +

    19 May 2023 | Linux Guide, Privacy

    +

    The official Proton VPN Linux client lacks a lot of features, like changing the connection protocol, quickly connecting to the fastest server of a specific...

    +

    Read More

    +
    +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + diff --git a/robots.txt b/robots.txt new file mode 100644 index 0000000..400abba --- /dev/null +++ b/robots.txt @@ -0,0 +1,8 @@ +User-agent: googlebot-image +Disallow: / +User-agent: psbot +Disallow: / +User-agent: * +Disallow: +Disallow: /cgi-bin/ +Sitemap: https://aiquiral.me/sitemap.xml diff --git a/self-hosting.html b/self-hosting.html new file mode 100644 index 0000000..f744906 --- /dev/null +++ b/self-hosting.html @@ -0,0 +1,77 @@ + + + + Category - Self-hosting | Aiquiral's Blog + + + + + + + +
    +
    + +
    +
    + +
    +

    Category - Self-hosting

    + + + + + +
    + + +

    How to Bypass CGNAT - Exposing your home server to the internet with TLS/SSL pass through

    +

    07 October 2023 | Linux Guide, Privacy, Self-hosting

    +

    You've set up a home server, and are hosting some services like Vaultwarden, or Jellyfin, or perhaps Nextcloud. But now, you want to share it...

    +

    Read More

    +
    +
    + +
    + + +

    Awesome Privacy

    +

    26 April 2023 | Privacy, Self-hosting

    +

    (UNDER CONSTRUCTION) A list dedicated to providing the best tools and services to protect your online privacy.

    +

    Read More

    +
    +
    + + + + + +
    +
    +

    MusicOther ProjectsPrivacy PolicyAbout

    +
    + + \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml new file mode 100644 index 0000000..9f9e166 --- /dev/null +++ b/sitemap.xml @@ -0,0 +1,49 @@ + + + + + https://blog.aiquiral.me/ + weekly + 1 + + + https://blog.aiquiral.me/privacy + weekly + 0.5 + + + https://blog.aiquiral.me/self-hosting + weekly + 0.5 + + + https://blog.aiquiral.me/linux-guide + weekly + 0.5 + + + https://blog.aiquiral.me/animation + weekly + 0.5 + + https://blog.aiquiral.me/bypass-cgnat + monthly + 0.9 + + + https://blog.aiquiral.me/remap-keyboard-keys-using-evremap + monthly + 0.9 + + + https://blog.aiquiral.me/proton-vpn-linux-guide + monthly + 0.9 + + + https://blog.aiquiral.me/awesome-privacy + monthly + 0.9 + + +