this post was submitted on 14 Jan 2022
12 points (92.9% liked)
Open Source
31173 readers
442 users here now
All about open source! Feel free to ask questions, and share news, and interesting stuff!
Useful Links
- Open Source Initiative
- Free Software Foundation
- Electronic Frontier Foundation
- Software Freedom Conservancy
- It's FOSS
- Android FOSS Apps Megathread
Rules
- Posts must be relevant to the open source ideology
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
- !libre_culture@lemmy.ml
- !libre_software@lemmy.ml
- !libre_hardware@lemmy.ml
- !linux@lemmy.ml
- !technology@lemmy.ml
Community icon from opensource.org, but we are not affiliated with them.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
because the server could be compromised
Could try setting up a VPN like Wireguard....
what?
A VPN provides absolutely no protection against a compromised server.
It's not easy as you may think, if you use a VPN, a secure router and follow common security practices for nextcloud, SSH and the like. If someone can access your server with those thing in place you would have a lot more to worry. IMHO a selfhosted nextcloud works better without encryption, without high risks. Of course if your threat model call for it, encrypt whatever you need, but common users are going to lose too much for nearly no gain
why would it work better without encryption? I don't see any loss in having client side encryption tbh. common security practices are cool but there are new security vulnerabilities everyday.
Nextcloud encryption isn't perfect, and you will lose some functionality (e.g. image preview). You could think about encrypting only what you think is particularly sensible, with something like cryptomator