I would not publicly expose ssh. Your home IP will get scanned all the time and external machines will try to connect to your ssh port.
Novi
Over the top for security would be to setup a personal VPN and only watch it over the VPN. If you are enabling other users and you don't want them on your network; using a proxy like nginx is the way.
Being new to this I would look into how to set these things up in docker using docker-compose.
Thanks for publicly declaring your lack of empathy.
You have a mini sword breaker. It'll be fine...
Edit: autocorrect....
I'm not your pal, friend.
Eternity, I just wish it was updated more frequently.
Edit: I can't spell.
Voltage. AA and AAA are 1.5 volts. A 9volt has essentially 6 AAAA batteries in them ran together in series to provide 9-volts. It's a common standard, and has the snap terminals which is good for things that are moving around instead of a spring loaded compartment.
You can accomplish the same with any VPN solution that supports split tunneling.
How else does it remove undesirables. /s
I don't disagree, and I am one of the VPN advocates you mention. Generally there is no issue with exposing jellyfin via proxy to the internet.
The original question seemed to imply an over-secure solution so a lot of over-secure solutions exist. There is good cause to operate services, like jellyfin, via some permanent VPN.