this post was submitted on 09 Oct 2025
423 points (99.8% liked)

Selfhosted

53448 readers
418 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] FreedomAdvocate@lemmy.net.au -2 points 1 month ago (1 children)
[–] village604@adultswim.fan 0 points 1 month ago* (last edited 1 month ago) (1 children)

Because best practices for connecting an unsupported operating system to the Internet are to not do it.

Even if the OS is safe on the day support ends, a critical vulnerability might be found just a few days later. It's also possible that an exploit has already been found that the bad actor is sitting on it until support ends.

Even if that doesn't happen, software developers are going to drop support for the OS and vulnerabilities found in those applications could be used to gain ingress.

No amount of "being careful using the Internet" is going to prevent hacking if the system has exploits. If you context a fresh install of XP to the Internet, your system will be compromised in a matter of minutes.

[–] FreedomAdvocate@lemmy.net.au 1 points 1 month ago* (last edited 1 month ago)

It’s not flat out wrong though. Best practices for when your OS is EOL are different to best practices for a currently supported OS.

All those “experiments” where people go online with a new install of xp and are compromised in minutes disable windows firewall and don’t use any antivirus software. You seem like an expert - is that best practice? Do regular people just turn off the Windows firewall and disable their AV?

Believe it or not, firewalls and AV still stop unpatched security vulnerabilities - the security patches just mean they don’t have to.