I would not publicly expose ssh. Your home IP will get scanned all the time and external machines will try to connect to your ssh port.
Novi
Over the top for security would be to setup a personal VPN and only watch it over the VPN. If you are enabling other users and you don't want them on your network; using a proxy like nginx is the way.
Being new to this I would look into how to set these things up in docker using docker-compose.
Thanks for publicly declaring your lack of empathy.
You have a mini sword breaker. It'll be fine...
Edit: autocorrect....
Eternity, I just wish it was updated more frequently.
Edit: I can't spell.
How else does it remove undesirables. /s
I have, never fix this. It's a fidget spinner built in..
They mostly don't own anything. Either a rich person or a company owns where they live.
Set aside a few weekends and mess around distro hopping. Think of it as a small scientific study. Use what you determine to be the most comfortable.
I suggest being clever in your partitioning keeping /home and any other areas personal to their own partition if not their own disks. If you want to experiment you lose nothing by wiping / and installing something else. Also, you should decide on an effective backup strategy.
I would not vote guilty on your jury.
I don't disagree, and I am one of the VPN advocates you mention. Generally there is no issue with exposing jellyfin via proxy to the internet.
The original question seemed to imply an over-secure solution so a lot of over-secure solutions exist. There is good cause to operate services, like jellyfin, via some permanent VPN.