

For OTPs you might not want to send them by email, emails are a little less secure than SMS (it’s easier for a third party to hack your email than to intercept your SMS)


For OTPs you might not want to send them by email, emails are a little less secure than SMS (it’s easier for a third party to hack your email than to intercept your SMS)


As OP said, it’s fine if you still use some corporate services, I think this one should be in the bottom of the list
Wireguard can easily replace simple Tailscale usages, like if you only have 2 nodes to connect and have a static IP address. One thing Tailscale is good at is creating an overlay network, where if you have more than 2 nodes, you only need to configure each one to connect to the central server which will allow the nodes to connect to each other (internally it uses a wireguard connection). With plain wireguard if you have 4 nodes, you need to configure on each one the configuration to the 3 other. Another thing Tailscale is good at is Nat hole punching, if your ISP provider doesn’t give you a static IP address or if you don’t want to open a port in the firewall of your home router, Tailscale will allow you to access services hosted on your local network (another commercial solution for this is cloudflare tunnel), wireguard doesn’t provide this
When you’re using tailscale, they get a lot of metadata about your hosts, but the data transfered between your nodes is encrypted (by wireguard)
By replacing the tailscale servers which are ran by the tailscale company with headscale which is the self hostable open source solution, tailscale won’t be able to get the metadata of your nodes. Tailscale clients are oss and compatible with headscale, but headscale is not on par for features (like tailscale serve or funnel).
For headscale to really make sense it usually needs to run on a pubicly accessible host like a vps, and not in your home network. For other selfhosted alternative to tailscale there is netbird, or pangolin with a different approach
Hope this helps


It would be really nice to have ansible playbooks with the instructions


The GPL is enforceable, as far as the courts in the US are concerned, but the time and expense of doing so means such cases are rare. One such claim against Vizio, filed in 2021 by the Software Freedom Conservancy, is expected to be tried in September 2025.
Hill pointed to a series of posts he made in June 2024 about “sleazy rip-offs in the Chrome Web Store” that simply rewrap “uBlock, uBlock Lite, or other content blockers with their own user interface,” and some monetization scheme, often removing the copyright and licensing information
If a pretty large project such as ubo doesn’t have the means to enforce the GPL license, I think pretty much all open source projets, that are usually lacking funds, wouldn’t be able to enforce their license either
I didn’t realize that before, I thought copyleft licences like GPL really offered something but unless the project is backed by a for profit company or has enough funding, permissive licenses like MIT/FreeBSD achieve kind of the same result in practice… And all the contributions I did on copyleft projects could be (and probably were) stolen to make profits, while the maintainers of the original project struggle to pay for coffees… I feel a lot less guilty for my media piracy
But I wonder, are there means to enforce this license from outside the US ?
Can the hoster be liable for illegal content stored on their server if they have no way to decrypt the files?