“Secure” and “exposed” are antonyms in this scenario, that’s the nature of the beast. I use Nginx which I have a domain pointing to. Worst case scenario, a hacker brute forces access to my container and mucks around within the confines. As I understand from a WireGuard VPN, there’s an added level of security. You have to use the VPN to get access to your home ports, and then you can access your Docker containers as configured. There’s an added layer of security.
Some things to consider:
I’ve been running some local servers for a few years only behind Nginx. So far nothing bad has happened. But that doesn’t mean something bad couldn’t happen later.
Something important to remember is how many great franchises or games were originally made by a very small (or “indie”) team. Zelda, Tetris, Mario, Minecraft, Sonic, Civ, and others. Each eventually either grew massively or were bought out by a bigger corporation later. Indie games may not be our savior, but so many mainstream games started out small. It seems to me that the smaller the team, the bigger the innovation.
Somebody is gonna try to fact check me on this, so I’ll just say my point is you can’t have a healthy gaming industry without a healthy indie industry too, IMHO.
I’m intrigued. And although I read the article, I’m not entirely sure who or what this is for. It’s cool, but… what?
What I was referring to is called a Bind Mount, where host directories are exposed to the docker container. You may be fine if it’s an external hard drive. I use bind mounts because they’re easier to back up, but I acknowledge they are less safe.
You may be perfectly fine as you are now. My (and others) suggestions are for added security. As it stands, if there’s no target on your bind, the only bad traffic you’ll get are from bots trying to pick away at your domain and sub domains. Generally they’re not a problem. But being extra safe costs nothing but time.