Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm working on De-Googling. I now have a Mac and an iPhone instead of Windows/Android, but switching from Drive to iCloud seems a fairly parallel move.

I also set up my first home server with RAID NAS. It's on my list to spin up an OpenOffice container or something I can use to replace Google Sheets. That will let me delete my Drive data; next is Google Photos and eventually Gmail.



It took about a week for me to completely de-Google from scratch.

Drive was easy enough to download everything off, but the real pain in the arse was Google Photos. I had something like 250 individual 2GB zip files and the supplementary metadata was separated off of the image files themselves. I had to put together some Python scripts to clean up all the different file naming formats over the years (PIXL_YYYYMMDD, IMG_YYYYMMDD) into just YYYYMMDDD, and reattach the metadata, and then check through that everything was safely downloaded before deleting the Google Photos.

Google Photos had some weird caching issues where it kept showing images I'd deleted and emptied from the bin, which was a little concerning. They were only appearing on my phone and persisted multiple times after clearing the cache. I couldn't find them anywhere in the phones internal storage.


Perhaps google takeout would have been easier?


That was Google Takeout! Although in retrospect I did find larger ZIP size options after doing the original export. But it filled Google Drive with 700GB of folders, so I just stuck with downloading the 2GB ones.


Why does yours go to drive? When I do a takeout, it just has links to download, not on drive.


Is your home server LAN only or have you configured it in some way to be accessible and secure on the internet? I'm interested in setting up a fileserver myself but I'm not sure what the latest is on security.


I definitely don't open a bunch of ports to the internet! I use Wireguard to VPN back into my home network from my mobile devices. Wireguard only responds to packets that contain a valid preconfigured crypto key, so while the WG port is technically "open" it doesn't respond to a port scanner.


Tailscale is a great place to start. It uses a VPN to access your servers while outside of your LAN while avoiding the security risk of them being wide open to the internet.


So the way I understand Tailscale is that it's built on top of Wireguard; Tailscale claims it's "easier to use" but I haven't found Wireguard to be difficult to configure at all. Are there any extra benefits to using Tailscale that I'm overlooking?


Yes, Tailscale uses Wireguard. If you can use Wireguard, that is great. That is not an option for many people who are behind a CGNAT and/or do not have the ability to setup port forwarding. Tailscale also makes it easier for sharing access with other users.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: