██████╗██╗   ██╗██████╗ ██╗  ██╗███████╗██████╗ ██████╗ ██╗   ██╗███╗   ██╗██╗  ██╗
██╔════╝╚██╗ ██╔╝██╔══██╗██║  ██║██╔════╝██╔══██╗██╔══██╗██║   ██║████╗  ██║██║ ██╔╝
██║      ╚████╔╝ ██████╔╝███████║█████╗  ██████╔╝██████╔╝██║   ██║██╔██╗ ██║█████╔╝ 
██║       ╚██╔╝  ██╔═══╝ ██╔══██║██╔══╝  ██╔══██╗██╔═══╝ ██║   ██║██║╚██╗██║██╔═██╗ 
╚██████╗   ██║   ██║     ██║  ██║███████╗██║  ██║██║     ╚██████╔╝██║ ╚████║██║  ██╗
 ╚═════╝   ╚═╝   ╚═╝     ╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝╚═╝      ╚═════╝ ╚═╝  ╚═══╝╚═╝  ╚═╝

Building Systems That Serve Us

Technology for independence, infrastructure for autonomy, knowledge for the commons.

This blog explores self-hosted infrastructure, architectural patterns that resist lock-in, and the technical decisions that preserve control over our digital systems.

What You’ll Find Here

Technical deep-dives on infrastructure patterns, security configurations, and system design decisions that prioritize independence over convenience.

Practical implementations tested in real environments—from Proxmox clusters to pfSense configurations to self-hosted service alternatives.

Critical analysis of vendor dependencies, cloud architectures, and the trade-offs between control and managed services.

Community knowledge shared openly, because better internet infrastructure benefits everyone.

> systemctl status privacy.service

● privacy.service - Digital Privacy & Security
   Loaded: loaded
   Active: active (running)
   Uptime: enough
   
   This blog: No cookies, no tracking, no analytics.
   Hosted on my own infrastructure.
   Source code available upon request.

“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place.” - Eric Hughes, A Cypherpunk’s Manifesto, 1993


> find /blog -name “*.md”

[RSS]