

I prefer to use products and services before inevitable enshittification, not after the curve. Refusing to use them won’t change their fate.
I prefer to use products and services before inevitable enshittification, not after the curve. Refusing to use them won’t change their fate.
It’s definitely not the same thing. I do understand reservations behind usage free-tier services from Big Bad Corp., but I don’t understand malicious reduction of valid arguments for usage of those services.
Again, attack targets end users, not Cloudflare tunnel operators: It abuses Cloudflare Tunnels as a delivery mechanism for malware payloads, not as a method to compromise or attack people who are self-hosting their own services through Cloudflare Tunnels.
This attack targets end users, not Cloudflare tunnel operators (i.e. self-hosters). It abuses Cloudflare Tunnels as a delivery mechanism for malware payloads, not as a method to compromise or attack people who are self-hosting their own services through Cloudflare Tunnels.
My daily is a cheap surface-like tablet, Chuwi Hi 10 Max with N100, that runs on Opensuse. The only thing that doesn’t work are internal cameras, everything else is great. I can only assume Fedora would be the same.
I have this one from aliexpress with touch and I use it with cheap surface-like tablet (Chuwi HI10 MAX) and sometimes with Windows 10 desktop or Samsung Dex. It works with one usb-c cable or with mini-hdmi and power cable, colour rendering is acceptable, view angles are great. Unfortunately, although touch works great on desktop I can’t configure it to work on linux tablet. As far as I know, it’s impossible(?) to have two proper touch screens with Wayland.
Understandable. It’s compromise I’m ok with, so that’s why I mentioned this method.
I use cloudflare tunnel for this purpose. No open ports, no dealing with ISP, no exposing my IP.
OpenSUSE Tumbleweed. Recently I bought cheap Surface-like x86 tablet on a rather recent hardware, and running Debian and its cousins required more tinkering than I was willing to do, so I decided to go with a more modern rolling release. Tried Arch for a few months, bricked it from mixing stable and testing branches, tried Fedora, and finally settled in Tumbleweed. I like it for being on the bleeding edge and exceptionally stable at the same time, perhaps thanks to robust OpenSUSE Build Service automated testing. And it is from a European company, that can’t hurt.
No public server required at all
CF: Yes
frp: No
DDoS protection, WAF, and automatic SSL
CF: Yes
frp: No
Access controls and auth
CF: built-in Zero Trust
frp: manual setup of token/OIDC
Managed DNS
CF: Yes
frp: No
Built in security tools
CF: Yes
frp: No
Just like I said - prevalent reduction of valid arguments for usage of those services.