this post was submitted on 29 Sep 2025
100 points (99.0% liked)

Selfhosted

51841 readers
984 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

As I rely more on my home lab server, I'm starting to worry more about it getting stolen. If someone breaks into my home, I think the server will be a pretty attractive target.

Do y'all just stick it in a closet? That seems not great for cooling...

One of my neighbors recently got broken into.

you are viewing a single comment's thread
view the rest of the comments
[–] lorentz@feddit.it 31 points 18 hours ago (2 children)

Backup and encryption. encryption prevents the thief to see my data, backup allows me to make a new server. Furthermore, as other pointed out, I don't expect that a common thief will see a lot of value in a small black box on top of a shelf

[–] paequ2@lemmy.today 2 points 10 hours ago (2 children)

Backup and encryption

Yeah, I guess this is the solution. Encryption I get. But where do you backup to? I currently have about 4TB of data and was thinking of at least doubling capacity soon. How expensive is it to backup 8TB of data somewhere?

[–] lorentz@feddit.it 2 points 6 hours ago

The really important things (essentially only photos) are backed up on a different USB drive and remotely on backblaze. Around one terabyte cost 2-3$ per month (you pay by operation, so it depends also by how frequently you trigger the backup). You want to search for "cold storage" which is the name for cloud storage unfrequently accessed (in other words, more storage than bandwidth). As a bonus, if you use rclone you can encrypt your data before sending it to the cloud.

I put a tiny NAS in my parents’ house (cheapest ARM synology 2-bay). It backs up their computers (a first, of course, but the photos are safe now!) and my server sends its TBs to there too. Upfront is large because you need to put in two big drives plus a lil NAS. But no $/mo, thanks parents.

For over a few TB Hetzner and the like really hit hard (€21/mo for 10TB at Hetzner storage box). Depends how much disposable income you have/want to ensure data is good. Now-a-days €21/mo is like 1 Disney/Hulu/bullshit, that price is obviously over inflated but it makes you feel less bad about spending it on cold, hard, remote backups of your big ass data.

[–] WhyJiffie@sh.itjust.works 5 points 16 hours ago (4 children)

how do you unlock the encrypted disks? is it manual, or did you automate it?

[–] fmstrat@lemmy.nowsci.com 1 points 5 hours ago

Dropbear. You can run a small SSH server in initd that allows you to SSH in and type the encryption password. It doesn't run a shell, just cryptsetup.

One of the best uses of encryption is that you can pull drives that die and not have to try to wipe them as they die or smash them. They’re encrypted so it’s just gibberish. Mostly the reason to encrypt.

I auto-unlock with two things: a USB drive I put in the computer that it looks for and another computer on the network that hosts an unlock file. I’m not defending against nation-states or the Gestapo, regular rubes won’t notice the pi zero hidden that hosts the network file. USB drive is for just-in-case so I don’t have to type that long ass password ever.

I didn’t try hard, but I’m not sure how to make auto-unlocking more secure.

[–] lorentz@feddit.it 1 points 6 hours ago

I have automated it with a small initramfs script which has half password and download the other half from internet. My threat model is to protect from a random thief. So they should connect it to a network similar to mine (same netmask and gateway) and boot it before I can remove the half key from internet.

some security which is on my TODO list is: allow fetching the half key only from my home IP and add some sort of alert for when it is fetched.

[–] dreadbeef@lemmy.dbzer0.com 2 points 15 hours ago (2 children)

Linux with LUKS can be configured to decrypt at boot

[–] WhyJiffie@sh.itjust.works 2 points 9 hours ago (1 children)

ok, but where does it get the decryption key from. my real question is how did you implement automatic unlock securely

[–] dreadbeef@lemmy.dbzer0.com 2 points 9 hours ago

you type it in on boot

[–] frongt@lemmy.zip 1 points 10 hours ago (1 children)

That kind of defeats the purpose then doesn't it

[–] dreadbeef@lemmy.dbzer0.com 2 points 10 hours ago* (last edited 10 hours ago) (1 children)

shut down and its encrypted? ofc you also have to have a decrypt password. I use luks so if my computer gets stolen my files arent readable, which is true because they cant leave my house without unplugging it

[–] frongt@lemmy.zip 1 points 10 hours ago (1 children)

Oh, if there's a password then that's different.

But they certainly can take it without unplugging it, if they really want to. For example: https://cdsg.com/products/hotplug-field-kit

[–] dreadbeef@lemmy.dbzer0.com 1 points 9 hours ago

good to know! thankfully I legit don't have much sensitive stuff in my computer but will try to keep a good habit of shutting down lol