Hacker News new | past | comments | ask | show | jobs | submit login

Ok, I’m SUPER into self hosting, but this article? No way. 1) Duck out isn’t a thing, just stop it. 2) Half the articles cited as examples of corporate abuse were later revealed to be mistakes by the user or easily avoidable pitfalls. 3) Self hosting still requires trust (software you’re running, DNS, domains, ISP, etc...) The line of who to trust and how far is a tough one to answer, even for the informed.

How I solved it: 1) I use well vetted cloud services for things that are difficult/impossible to self host or have a low impact if lost. (Email, domains, github, etc...) 2) I self host things that are absolutely critical with cloud backups. (Files, Photos, code, notes, etc..)




I am perpetually confused about why people think that self-hosting on a VPS solves their privacy and security problems. While I'm sure there are controls in place at reputable VPS providers, it wouldn't be too difficult for them to grab absolutely anything they want. Even disk encryption doesn't save you. You're in a VM, they can watch the memory if they need to.

Using a VPS can also make you more identifiable. Your traffic isn't as easily lost in the noise. The worst thing that I know of people doing is using a VPS for VPN tunneling. While it can have its uses, privacy certainly isn't one of them. You're the only one connecting into it and the only traffic coming out of it.


So I agree with your sentiment, your details are a little off. “it wouldn't be too difficult for them to grab absolutely anything they want. Even disk encryption doesn't save you. You're in a VM, they can watch the memory if they need to.” It would be difficult because you’d have to have host access. VM disk encryption is now tied into an HSM or TPM these days, host access wouldn’t help. As for memory, that is now usually encrypted, so no dice there either. The security of a big name public VPS is astoundingly better than what you can do yourself.

“Using a VPS can make you more identifiable” I think you have a problem of “threat model” here. You’re mixing up hiding against hackers, governments, etc and just lumping it under “privacy and security” Using a VPS isn’t going to make you more identifiable to google, because you’re not using google now. Using a VPN isn’t going to make you more identifiable to your ISP, because all they can see is that you have a VPN up. Why not use a VPS for VPN? Well you’re only right it would suck if your threat model includes governments or hostile actors, me hiding from my ISP or on a public Wi-Fi? Not a problem.

You conflate a few ideas and threat models.

Security = The ability to not have your stuff accessed or changed. Privacy = The ability to not have your stuff seen. Anonymity = The ability to not have your stuff linked back to you. Threat model = Who are you protecting yourself from? E.g. The steps I take to not get hacked by the NSA are going to be different then the steps I use to make comments on 4chan or whatever are different than the steps I take to use public Wi-Fi.

Ref: I work for Amazon AWS, my opinions are my own insane ramblings.


> Encryption tied to TPM

Common on laptops, but I wouldn’t assume that for systems/SANs in a data center, much less their virtual disks. Would love to be corrected.


AMD secure memory encryption and secure encrypted virtualization. Intel probably has something in the works, but today you can take a GCE instance from a signed coreboot through bootloader and kernel with logged attestation at each phase resulting in a VM using per-VM disk encryption key (you have to provide it in the RPC that starts the machine; it's supposedly otherwise ephemeral) with SME encrypted RAM (again, ephemeral per-machine key). Google calls it Confidential VM and Secure Boot for now.


Google builds its own solution into all servers... And to show that branding brilliance, uses the same name as for all things security: https://www.datacenterdynamics.com/en/news/google-reveals-de...


TPM is a server technology recently backported to laptops.


> It would be difficult because you’d have to have host access.

Which AWS has, by definition.

> VM disk encryption is now tied into an HSM or TPM these days, host access wouldn’t help.

Are you passing all of the data through the TPM? If no: you still need to keep the key in memory somewhere, the TPM is just used for offline storage. If yes: the TPM, and the communication with it, is still under AWS' control.

> As for memory, that is now usually encrypted, so no dice there either.

Still need to keep the key somewhere, so same concern as for disk encryption. Except I can pretty much guarantee you're not putting the TPM on the memory's critical path, so...

> The security of a big name public VPS is astoundingly better than what you can do yourself.

Feel free to back such claims up in the future. Because right now this seems to be as false as the rest of your post.

> Using a VPS isn’t going to make you more identifiable to google, because you’re not using google now.

What? It certainly won't make you less identifiable either.

> Using a VPN isn’t going to make you more identifiable to your ISP, because all they can see is that you have a VPN up.

Your VPN provider, on the other hand, can now see all of the traffic, where before they couldn't. So the question is ultimately whether you trust your ISP or VPN provider more.

> Why not use a VPS for VPN? Well you’re only right it would suck if your threat model includes governments or hostile actors, me hiding from my ISP

Sure, if you trust the Amazon over your ISP that makes perfect sense. Then again, this is the Amazon that seems to love forcing their employees to piss in bottles, and is on a huge misinformation campaign against treating their employees properly.

That seems like an upstanding place with great leadership.

> or on a public Wi-Fi? Not a problem.

Makes some sense, but it wouldn't really give you much more than hosting the VPN at home. (Well, you'd still have to do the same calculus here for home ISP vs Amazon.)

> You conflate a few ideas and threat models.

Pot, meet kettle.

> Ref: I work for Amazon AWS, my opinions are my own insane ramblings.

Good to know that AWS employees are either clueless about their own offerings, or deliberately spreading misinformation.

Seems like a place that I'd love to trust...


"Good to know that AWS employees are either clueless about their own offerings, or deliberately spreading misinformation."

::shrugs:: I don't work for that part of AWS. My opinion came from other experience.

You're not only wrong, but you managed to insult me while being wrong. That's the worst kind of wrong.

If you want some further reading, there is some cool work being done in this space.

https://docs.aws.amazon.com/enclaves/latest/user/nitro-encla...

https://cloud.google.com/blog/products/identity-security/int...

https://azure.microsoft.com/en-us/solutions/confidential-com...


Happy to be corrected if something is actually wrong, but somehow perpetual motion machine peddlers always seem to forget that part.


Again, with the insults. I comment for your benefit, not mine. I already know the right answers here, it is you who are mistaken. So you can either consider an alternative experience set which undoubtedly differs from yours, or not. I don’t care either way.


VPS doesn't solve privacy and security, it solves getting locked out of your account because some algorithm decided you were peddling child porn.

If you want privacy and security and you don't trust your provider, then you have to build your own hardware and compile everything you run on it from vetted source, including your kernel. You can do it, but most people decide that on balance its better to trust someone.


VPS doesn't solve privacy and security, it solves getting locked out of your account

Does it really? It just seems like instead of trusting a big company that everyone knows, you trust a smaller company that not everyone knows that involves more work for you.

I'm pretty sure I've seen articles on HN where VPS companies (maybe DO?) have kicked people off their infrastructure with zero notice. So, not at all different from being locked out of Apple/Google/Amazon.


> Does it really?

Yes. VPS is a standardized commodity. If one provider shuts you down you can just move to another.


Perhaps, depends on your needs, risk model, pricing etc... I use DO but couldn’t use AWS due to price for example. Hoping platforms whenever you catch the ire of the gods is a bad CX for this problem space.


You're the second person to mention DO. I have no idea what that is. But here is a list of 20 VPS providers:

https://techjury.net/best/vps-hosting/

As you can see, AWS is far from the only game in town. If you can't find two or three from that list that will meet your needs then perhaps you should reassess your quality metric.

(I note in passing that my preferred provider, Linode, is not even on that list.)


DO = Digital Ocean Again, depending on your needs, VPS are not a commodity. GCP offers a few things that Azure or AWS don’t, etc... Often times making sweeping generalizations without deep industry knowledge is a bad idea. If you don’t even know what DO is, why do you feel experienced enough to argue?


Because I've been self-hosting my internet services on VPS's for the last 15 years on various providers. There are literally dozens of them. They are absolutely a commodity.


God, you just don’t get it.

NOT EVERYONE HAS THE SAME NEEDS AS YOU.

DIFFERENT CLOUD PROVIDERS OFFER DIFFERENT SERVICES

YOU OBVIOUSLY HAVE NO IDEA WHAT THE MARKET OFFERS

/rant


"Cloud" and "VPS" are not the same thing. VPS = Virtual Private Server, which is one very specific kind of cloud service. Cloud services in general are not a commodity, but VPS is.


::facepalm:: Tell that to my lambda functions.


Howso? The VPS can shut you down as well? You might say the migration path is easier, but there will be a weak link somewhere. Even if you put up a datacenter in the basement you need to connect to the internet somehow which can be taken away.


> Howso? The VPS can shut you down as well?

Yes. but VPS is a standardized commodity. If one provider shuts you down you can just switch to another.


well DO decided to lock me out of my account that I had for years because they decided that I'm a fraud and had to deal with their terrible customer service


With rclone you can encrypt data locally while uploading. This allows you to host everything from home and use the cloud only for backups, basically end-to-end encrypted.


A setup that probably works is vps -> tor -> vpn or some other order of these three, but I couldn't find any sort of blog that detailed setting up something like this so I imagine very few people are doing it.


I always think of it as – how many examples of "I got locked out of all my data!" would there be if billions of people start following the author's advice? Definitely more than the ~5 they list (whether that is user error or actually Apple/Google/Amazon's fault).


the 'duck it out' thing really made me cringe. we really need to get away from that idea of having a searching verb that is tied to the popular search engines of the day. i use duckduckgo but it might not be around in 10 or 20 years or there might be something better by then so its pointless to expect everyone to keep learning new verbs all the time.


> 1) Duck out isn’t a thing, just stop it.

Well, 1) sorry but you don't get to decide this, 2) how would anything ever become a thing if people were not allowed to invent new things?

- I'm not favoring the term just opposing your commanding


I do get to decide, as a member of popular culture, I get a say. (So do you!) And I say a resounding “no!” To duck it out.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: