this post was submitted on 23 Oct 2025
356 points (98.9% liked)

Selfhosted

52611 readers
405 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Has this impacted your self hosted instances of Immich? Are you hosting Immich via subdomain?

Related:

you are viewing a single comment's thread
view the rest of the comments
[–] chaospatterns@lemmy.world 9 points 5 days ago* (last edited 5 days ago) (2 children)

It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

If you don't have them on the open web, developers and pull request authors can't see the previews.

The issue they had was being marked as phishing, not the SSL certificate warning page.

[–] Nibodhika@lemmy.world 0 points 5 days ago (1 children)

It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

So? What that has to do with SSL certificates? Do you think GitHub loses SSL when viewing PRs?

If you don't have them on the open web, developers and pull request authors can't see the previews.

You can have them in the open, but without SSL you can't be sure what you're accessing, i.e. it's trivial to make a malicious site to take it's place an MitM whoever tries to access the real one.

The issue they had was being marked as phishing, not the SSL certificate warning page.

Yes, a website without SSL is very likely a phishing attack, it means someone might be impersonating the real website and so it shouldn't be trusted. Even if by a fluke of chance you hit the right site, all of your communication with it is unencrypted, so anyone in the path can see it clearly.

[–] Count042@lemmy.ml 4 points 5 days ago (1 children)

Yes, a website without SSL is very likely a phishing attack, it means someone might be impersonating the real website and so it shouldn't be trusted. Even if by a fluke of chance you hit the right site, all of your communication with it is unencrypted, so anyone in the path can see it clearly.

No, Google has hit me with this multiple times for sub domains where the subdomain is the name of the product and has a login page.

So, for example, if I have emby running at emby.domain.com they'll mark it as a phishing site. You have to add your domain to their web console and dispute the finding which is probably automated. I've had to do this at least three times now.

All my certs were valid.

[–] Nibodhika@lemmy.world 2 points 5 days ago

Yes, Google has miss reported my websites in the past, all of which were valid, but the person I'm replying to seemed to assume no-SSL is a requirement of the feature, and he doesn't understand that a wrong/missing SSL is indistinguishable from a Phishing attack, and that the SSL error page is the one that warns you about phishing (with reason).

[–] FreedomAdvocate@lemmy.net.au 0 points 5 days ago (1 children)

The issue they had was being marked as phishing, not the SSL certificate warning page.

Have you seen what browsers say when you have a look at the SSL certificate warning page?

It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

Why is a user made PR publishing a branch to Immich's domain for the user to see?

[–] BCsven@lemmy.ca 1 points 5 days ago (1 children)

I thought that was how pull requests worked, its a branch if you'veade a departure to edit code, you have the pull request and ask them to merge into the main branch. It should be visible to everyone so everyone can review the change.

[–] FreedomAdvocate@lemmy.net.au 1 points 1 day ago

The branch for the PR shouldn't be hosted on the production site's domain, and that deployment that the company will be testing and reviewing shouldn't be accessible to the public. They even have internal in the URL, while being accessible by external people lol