Okay so last month I posted about my home-built Raspberry Pi VPN setup for streaming and torrenting. A few people asked me to keep updating the speed tests, which I was doing. But something unexpected happened this week that changed the whole project. While running some routine traffic monitoring through ntopng, I spotted a pattern of inbound connection attempts from IPs in a range I don't recognize at all. They weren't brute force attacks on SSH, they were specifically probing the OpenVPN service port with what looked like packet-crafting tools. This isn't hypothetical security theater anymore. The logs show repeated SYN scans and malformed handshake packets designed to fingerprint or maybe crash the daemon. So my confident 'privacy by self-hosting' stance took a hit. I've now layered a Cloudflare Tunnel in front of it to mask the actual server IP and port, and set up fail2ban with rules specific to OpenVPN's log format. The speed for streaming took a dip, obviously, because of the extra hop. But trust the process, verify the data - I'm re-running the torrenting benchmarks with this new config. Lesson learned loud and clear: even on a Pi in your living room, you're on the public internet if you're hosting a VPN endpoint.