

So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
My ratchet way of doing it is Backblaze. There is a docker container that lets you run the unlimited personal plan on Linux by emulating a windows environment. They let you set an encryption key so that they can’t access your data.
I’m sure there are a lot more professional and secure ways to do it, but my way is cheap, easy, and works.
Making it pseudo-public and not using docker would be a mistake, in my opinion. Anything public-ish can benefit from the extra security of docker’s sandboxing.
It will also make it much easier to run things through a VPN with Gluetun—something you definitely want to do if you have strangers using your SearXNG instance.
You should really consider a container of some kind.
You are correct, they have infiltrated exit nodes, but it is still one of the most secure privacy tools available. If you are Al Quaeda, don’t use tor. If you are an average person preserving their privacy or subverting censorship, use tor.