I’m familiar with writing images, but I’d be crafting it myself since there’s no official one from Alpine Linux for the specific SoC.
I’m familiar with writing images, but I’d be crafting it myself since there’s no official one from Alpine Linux for the specific SoC.
I’m simply interested in running Alpine Linux on it.
It’s exactly that, I’m simply interested in running Alpine Linux on it.
Have you confirmed that with something like https://www.dnsleaktest.com? DNS leaks are common so it’s good to check.
What do you do if your hardware is housed at home with crappy residential upload speeds?
It’s a genuine question because I’ve settled for hosting on Storj, but because my friends and family can’t be bothered to connect via its client I’m running a WebDAV rclone
proxy on a VPS over Tailscale. So not only am I paying for the storage itself, I’m also paying for transferring the data and on top of all that, it defeats the point of Storj being P2P from and end-user perspective.
Those websites (and tons of others) will tell you who your ISP appears to be. Whether or not a service considers it a datacenter isn’t set in stone, but usually it’s easy to tell based on what’s shown there.
Edit: If you’re getting the captchas it’s probably because you appear to be on a VPN.
Are you familiar with web development by chance? Can you see anything in your browser’s developer tools like failed XHR/fetch requests? I’m kind of wondering if they’re doing something specific since you said traffic is flowing as expected on other websites.
If your VPN exits from a datacenter (common with VPN and cloud providers) it could be that while their website wasn’t smart enough to block you, the server the content streams from is and is refusing to stream the content. This would probably show up as a failure in the developer tools (HTTP 401 Unauthorized, some JSON with an error, etc).
What does Wireshark or tcpdump
show on any relevant interfaces?
To me it sounds like they want to host a store on Tor or i2p considering it’s typically recommended to disable JavaScript while browsing those networks due to security concerns.
I’ve done this with Tailscale and a VPS running WireGuard on one interface and Tailscale on another on Alpine Linux. I just set up routing so that any Internet traffic coming from tailscale0
is masqueraded/NAT over the wg0
interface. It took me months of screwing around to figure it all out, but I can provide all the necessary commands here if anyone wishes.
It should be generic enough to use with any two interfaces given one is your “internal” VPN and another is some other VPN (probably from a commercial offering).
These are great when you’re dependent on a “parent” LAN for internet access but want your own network away from it. Bonus points if you have VPN running transparently on the travel router to keep traffic private from the parent network’s operator.
I run a VPS with its own DNS resolver (to load blocklists), then it tunnels the traffic down a multi-hop VPN and it’s pretty excellent.
I suppose what I could do is download a supported image (like OpenWRT) then get the image layout details from that in order to build my own image.
I know I’m going about it the hard way but it’s something I don’t mind learning.