Vignesh
Volunteer Technologiest at SFLC.in. Prior to this, he was volunteer at other Free software organization such as Free Software Movement Karnataka and Free Software Foundation Tamil Nadu . He is passionate about free software, digital rights, privacy, environment, and fixing gender gaps and other marginalized community issues.
Accepted Talks:
Digital security with Free Software
This talk will focus on using Free software to deal with the safeguarding journalists and human rights defenders against various attacks in the online realm. We will live in a world where everything is online, digital hygiene is low and the awareness among the population is very minimal. We at SFLC.in provide Digital Security Training to enable the population with DIY tools and easy to understand information to prevent them from be becoming prey to any cyber attacks and cyber frauds. A collection of various Free Software tools and legal explainers have helped us design training’s that are easy to understand, interactive and easy.
Turn your spare laptop or any other device as a server
Have you ever wondered what to do with a spare laptop or any other unused device? I certainly have. So, I embarked on a research journey to explore how I could repurpose my laptop as a server, with a focus on enhancing security and minimizing vulnerabilities. While it’s important to note that no system is entirely invulnerable, some are certainly more secure than others.
My exploration led me to self-hosted VPN solutions, which allowed me to connect my home laptop with its 10 GB of RAM and 3 TB of storage to a less powerful server with 1 GB of RAM and 50 GB of storage. This setup provided the foundation for my server’s operation, ranging from basic to high-performance specifications. Setting everything up took some time and effort.
In a nutshell, I established a VPN connection between my home laptop and the server, ensuring they were on the same network. Next, I implemented an encrypted secure tunnel using WireGuard. Additionally, I set up a reverse proxy on my server, enabling all requests to pass through it and reach my home server securely.
During my talk, I will delve into the details of this process and explain each step thoroughly.