I’d really like to get started with this stuff but finding the technical requirement exhausting.
Trying to install privoxyvpn- “simply add the proxy to your browser and ensure the configuration is correct” (no help as to what this means, or how to do it and following the basic instructions just renders my browser unable to connect - googling the error message gives me replies like “simply make sure you read the logs” (no description of how to get to the logs or how to read them)
hearing I need a proxy and a reverse proxy, install SWAG — “first, point the A name at your server and the CNAME at the A and then install the SSL certificate - but be sure to pick between directories and subdomains if you have fewer than 20 domains in your account.”
Like what the fuck does any of this mean?
Then I hear if I have a proxy it might interfere with the reverse proxy and both might interfere with the VPN and vice versa.
How does one even get started?
Forgive my ignorance, but doesn’t the mullvad need to run through gluetun, or at least in its own docker container to be secure?
Or to put it another way, whats the benefit/cost of installing it via dpkg as opposed to running it in a container, as opposed to running it in in gluetun (in a container)?
i thought everything was supposed to run in a container if it’s touching the web
Your question touches on some advanced concepts in networking and system security, specifically around the use of VPNs and Docker containers. Let’s break down the differences and implications of running Mullvad VPN through various methods:
Mullvad via DPKG Installation (Direct Install on OS):
Mullvad in a Docker Container:
Mullvad with Gluetun (VPN in a Container):
In essence, the choice depends on your technical expertise, specific needs, and the level of security and flexibility you desire:
The idea that “everything touching the web should run in a container” is more of a best practice in professional IT environments, especially for server deployments, rather than a strict rule for personal use. It offers advantages in security and manageability but comes with a learning curve and complexity that might not be necessary for simpler or personal setups.