I used to self-host because I liked tinkering. I worked tech support for a municipal fiber network, I ran Arch, I enjoyed the control. The privacy stuff was a nice bonus but honestly it was mostly about having my own playground. That changed this week when I watched ICE murder a woman sitting in her car. Before you roll your eyes about this getting political - stay with me, because this is directly about the infrastructure we’re all running in our homelabs. Here’s what happened: A woman was reduced to a data point in a database - threat assessment score, deportation priority level, case number - and then she was killed. Not by some rogue actor, but by a system functioning exactly as designed. And that system? Built on infrastructure provided by the same tech companies most of us used to rely on before we started self-hosting. Every service you don’t self-host is a data point feeding the machine. Google knows your location history, your contacts, your communications. Microsoft has your documents and your calendar. Apple has your photos and your biometrics. And when the government comes knocking - and they are knocking, right now, today - these companies will hand it over. They have to. It’s baked into the infrastructure. Individual privacy is a losing game. You can’t opt-out of surveillance when participation in society requires using their platforms. But here’s what you can do: build parallel infrastructure that doesn’t feed their systems at all. When you run Nextcloud, you’re not just protecting your files from Google - you’re creating a node in a network they can’t access. When you run Vaultwarden, your passwords aren’t sitting in a database that can be subpoenaed. When you run Jellyfin, your viewing habits aren’t being sold to data brokers who sell to ICE. I watched my local municipal fiber network get acquired by TELUS. I watched a piece of community infrastructure get absorbed into the corporate extraction machine. That’s when I realized: we can’t rely on existing institutions to protect us. We have to build our own. This isn’t about being a prepper or going off-grid. This is about building infrastructure that operates on fundamentally different principles:

Communication that can’t be shut down: Matrix, Mastodon, email servers you control

File storage that can’t be subpoenaed: Nextcloud, Syncthing

Passwords that aren’t in corporate databases: Vaultwarden, KeePass

Media that doesn’t feed recommendation algorithms: Jellyfin, Navidrome

Code repositories not owned by Microsoft: Forgejo, Gitea

Every service you self-host is one less data point they have. But more importantly: every service you self-host is infrastructure that can be shared, that can support others, that makes the parallel network stronger. Where to start if you’re new:

Passwords first - Vaultwarden. This is your foundation. Files second - Nextcloud. Get your documents out of Google/Microsoft. Communication third - Matrix server, or join an existing instance you trust. Media fourth - Jellyfin for your music/movies, Navidrome for music.

If you’re already self-hosting:

Document your setup. Write guides. Make it easier for the next person. Run services for friends and family, not just yourself. Contribute to projects that build this infrastructure. Support municipal and community network alternatives.

The goal isn’t purity. You’re probably still going to use some corporate services. That’s fine. The goal is building enough parallel infrastructure that people have actual choices, and that there’s a network that can’t be dismantled by a single executive order. I’m working on consulting services to help small businesses and community organizations migrate to self-hosted alternatives. Not because I think it’ll be profitable, but because I’ve realized this is the actual material work of resistance in 2025. Infrastructure is how you fight infrastructure. We’re not just hobbyists anymore. Whether we wanted to be or not, we’re building the resistance network. Every Raspberry Pi running services, every old laptop turned into a home server, every person who learns to self-host and teaches someone else - that’s a node in a system they can’t control. They want us to be data points. Let’s refuse.

What are you running? What do you wish more people would self-host? What’s stopping people you know from taking this step?

EDIT: Appreciate the massive response here. To the folks in the comments debating whether I’m an AI: I’m flattered by the grammar check, but I’m just a guy in his moms basement with too much coffee and a background in municipal networking. If you think “rule of three” sentences are exclusive to LLMs, wait until you hear a tech support vet explain why your DNS is broken for the fourth time today.

More importantly, a few people asked about a “0 to 100” guide - or even just “0 to 50” for those who don’t want to become full time sysadmins. After reading the suggestions, I want to update my “Where to start” list. If you want the absolute fastest, most user-friendly path to getting your data off the cloud this weekend, do this:

The Core: Install CasaOS, or the newly released (to me) ZimaOS. It gives you a smartphone style dashboard for your server. It’s the single best tool I’ve found for bridging the technical gap. It’s appstore ecosystem is lovely to use and you can import docker compose files really easily.

The Photos: Use Immich. Syncthing is great for raw sync, but Immich is the first thing I’ve seen that actually feels like a near 1:1 replacement for Google Photos (AI tagging, map view, etc.) without the privacy nightmare.

The Connection: Use Tailscale. It’s a zero-config VPN that lets you access your stuff on the go without poking holes in your firewall.

I’m working on a Privacy Stack type repo that curates these one click style tools specifically to help people move fast. Infrastructure is only useful if people can actually use it. Stay safe out there.

  • merc@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    5
    ·
    23 hours ago

    Communication that can’t be shut down: Matrix, Mastodon, email servers you control

    Uh, those can all be shut down. You may control the server but you don’t control the datacenter the email server lives in, unless you’re hosting out of your house, which is a bad idea. You also don’t control the pipes to and from these servers. There have been many plans over the years requiring that ISPs ban users who are accused of copyright infringement. And, even if you don’t infringe copyrights, we all know about how the DMCA can be weaponized against people who have done nothing wrong.

    File storage that can’t be subpoenaed: Nextcloud, Syncthing

    Sorry, your own file storage can be subpoenaed, you just don’t have a lawyer on call to help you through the process. If you think “haha, I’ll just delete the data”, you can be in much worse trouble. AFAIK in some cases the judge / jury are allowed to assume that evidence that you deleted was incriminating.

    I self-host things and think it’s a good idea. But, don’t go overboard with how good it is. It’s still vulnerable to government and corporate actions. in many cases you’re more vulnerable because you’re on your own, you probably don’t have a lawyer on retainer, etc.

    • rmrf@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      22 hours ago

      I am not your lawyer and this is not legal advice for you or anyone who reads this.

      Nextcloud encrypts data e2e, so your point there is misguided and not really relevant. You can’t be compelled to provide a password/decryption key as long as it doesn’t exist as physical evidence. This is why lawyers advise clients to use a PIN instead of face ID or fingerprints; biometrics, like all physical evidence, can be subpoenad.

      Self hosting services like matrix or email is a bad idea if you don’t really understand what you’re doing, like many other things. If you keep you stuff updated and are intelligent in how you structure your network there’s not really anymore risk here than paying someone else to host it. If you keep you stack simple and follow best practices, code and configurations written by industry experts do most of the heavy lifting.

      • merc@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        This is why lawyers advise clients to use a PIN instead of face ID or fingerprints

        That’s because cops don’t need a warrant if you use a face or fingerprints, but they do if you use a PIN. What you’re talking about is for protection against casual, warrantless searches.

        What I’m talking about is a subpoena where you’re required to present evidence. The fact that it’s encrypted is irrelevant. If the data is subject to a subpoena it doesn’t matter if you store it encrypted or unencrypted, you’re still required to present it to the court.

        If you keep you stuff updated

        Keeping stuff updated is a chore, and it can take hours out of your week, often when you don’t expect it or don’t have time. When that’s someone’s full time job and they’re updating it for hundreds, thousands or millions or people, there’s a better chance they do it right, and a much better chance that they do it in a timely fashion.

        I am not your lawyer and this is not legal advice for you or anyone who reads this.

        I hope you’re not anybody’s lawyer, with your lack of knowledge of the law. Did you graduate from Dunning-Kruger law school?