![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
You will probably have to get a domain, but some of the ugly TLDs can cost few bucks for a year, so it’s not that bad.
As for being able to access your Nextcloud from outside, if you don’t use it to share large amount of data often, I recommend looking into Cloudflare Tunell. It’s pretty easy to set up, and allows you to not only put a configurable firewall in front of your Nextcloud instance that you can for example geoblock traffic from other countries, but you also don’t have to deal with port forwarding, DDNS, or exposing your home network directly into the internet.
The setup is simple, you just download their cloudflared service, install it with a token generated in their web management (that ties it to a domain and tells it what port it should expose) on your Nextcloud machine, and it will automatically connect to Cloudflare server that will act as a port forward, but without you having to expose anything on your home network directly.
I don’t really access my Nextcloud from the internet that often, don’t use it to stream or share large files with large number of people, so I never had issues with it. But I’ve been told that it’s against Cloudflare ToS to use it for large data sharing, streaming or high-volume data transfers, so keep that in mind.
But it’s perfect for accessing my Home Assistant and Nextcloud when I need it.
Ever since I played watchdogs and shadowrun, I wanted to work in cybersecurity, especially as a Red Teamer, which is literally Shadowrun - you run complex ops that have to break in, and steal stuff from largre banks without anyone but the management knowing about the test, with almost nothing being off-limits, as long as it doesn’t cause some kind of damage.
Five years later, I do work as a Red Team Lead. Hpwever, our company was just scrambling to start doing RT since thats the buzzword now, and while we did have amazing pentesters, unfortunately pentesting and Red Teaming requires vastly different skills. Ypu never need to avoid EDRs, write malware with obscure low-level winapi, or even know what kind of IoC ajd detections will a command you run create, when you are doing a pentest.
But since no one knew better, and I love learning and researching new stuff, while also having Red Teaming romabticized, my interrest in it eventually led to me getting a Lead position for the barely scrambling team.
Mind you, I was barely out of being a junipr, with only three years of part time pentesting experience. It was NOT a good idea.
I quickly found out that RT is waaay harder and requires the best of the best from cybersec and maleare development. We didnt have that. Also, turns out that I love to learn now stuff and take on a challenge, but being a Lead also means you are drowning in paperwork and discussions with client, while also everyone from the team doesn’t know what to do and turns to me about what should we do. Which I didn’t know, and barely managed to keep learning it on my own. Our conpany didnt want to give us much time for learning outside of delivery, I was only working parttime, and I was slowly realizing that we don’t have almost any of the skills we need.
We were doing kind of a good job, most of our engagement turned out pretty well, but it was atrocious.
Turns out, I’m not good at managing and planning projects, or leading people. I’m better just as a line member.