

Good point about network availability and endpoints.
Good point about network availability and endpoints.
Since I have no patience, I’ll lay out some items for consideration.
1st, I wouldn’t rely on an ISP router to serve as my end point for a VPN. They likely have access to manage that device and it likely isn’t getting any updates. You are better off implementing it with your own equipment that you keep updated.
If you have a capable security device serving as your router to the external internet and you want full access to your internal network, then you might consider using a VPN that terminates at your router.
I myself am a fan of setting up a jump host and initiating a VPN connection directly to that host when using an agent based solution. Then you can monitor the host for activities, more easily keep your edge device patched, and then use the capabilities of your jump host to interact with the rest of your network. This would require either an agent to periodically poll a platform for connection requests or another form of ingress into your network.
Expand on your use case. Why/what do want to access on your local network when you are not there?
https://www.take2games.com/privacy/en-US/#1-categories-of-information-collected
You can read right there in the policy. Just scroll down till you see the categories of information collected. Let me know if you need me to take a screenshot and circle it for you as well.
They don’t need to collect all this data, see the list below. Some, yes, but the majority has nothing to do with the service offered.
Collected Data Types:
• Identifiers / Contact Information: Name, user name, gamertag, postal and email address, phone number, unique IDs, mobile device ID, platform ID, gaming service ID, advertising ID (IDFA, Android ID) and IP address
• Protected Characteristics: Age and gender
• Commercial Information: Purchase and usage history and preferences, including gameplay information
• Billing Information: Payment information (credit / debit card information) and shipping address
• Internet / Electronic Activity: Web / app browsing and gameplay information related to the Services; information about your online interaction(s) with the Services or our advertising; and details about the games and platforms you use and other information related to installed applications
• Device and Usage Data: Device type, software and hardware details, language settings, browser type and version, operating system, and information about how users use and interact with the Services (e.g., content viewed, pages visited, clicks, scrolls)
• Profile Inferences: Inferences made from your information and web activity to help create a personalized profile so we can identify goods and services that may be of interest
• Audio / Visual Information: Account photos, images, and avatars, audio information via chat features and functionality, and gameplay recordings and video footage (such as when you participate in playtesting)
• Sensitive Information: Precise location information (if you allow the Services to collect your location), account credentials (user name and password), and contents of communications via chat features and functionality.
Forget trying to say anything positive about LLM or AI. The Lemmyverse downvotes any positive comment related to AI.
Why would you setup a deployment server on a non-trusted network?
I don’t think that is a fair argument in this day and age of software development, especially for an operating system. With that level of complexity, I would contend that it is next to impossible to identify potential failure scenarios. I also think this suffers from a rose colored glasses view on history. Perhaps software in the past was as vulnerable, it just never got patched because there wasn’t an easy method to apply updates. Now that there is, it is much better to have a responsive development team to react and fix obscure problems that are difficult or impossible to predict.
Posts like yours are why I read comments. It actually has content and I’m able to learn something from it. Thank you for you contribution.
This article has no useful information.
Thank you both for a positive example of challenging someone’s post.
100 is just the average. Most people score within 15 points in either direction of the average. The point being that 2 digit IQ occurs in about half the population. That said, his 79 still means he is dumb.
It isn’t always that they don’t know what they want, sometimes they just don’t know how to describe what they want, or they may know what they don’t want.
My mind immediately started singing Queen when I saw this picture. “Fat bottom girls you make the rocking world go round.”
The are you sure message is your parents and peers looking at you like you are stupid.
Video shows three new origins plus the ability to have non-gestalt consciousness. New megastructures.
Shit, I still see them pull out checkbooks.
A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.