I used to self-host because I liked tinkering. I worked tech support for a municipal fiber network, I ran Arch, I enjoyed the control. The privacy stuff was a nice bonus but honestly it was mostly about having my own playground. That changed this week when I watched ICE murder a woman sitting in her car. Before you roll your eyes about this getting political - stay with me, because this is directly about the infrastructure we’re all running in our homelabs. Here’s what happened: A woman was reduced to a data point in a database - threat assessment score, deportation priority level, case number - and then she was killed. Not by some rogue actor, but by a system functioning exactly as designed. And that system? Built on infrastructure provided by the same tech companies most of us used to rely on before we started self-hosting. Every service you don’t self-host is a data point feeding the machine. Google knows your location history, your contacts, your communications. Microsoft has your documents and your calendar. Apple has your photos and your biometrics. And when the government comes knocking - and they are knocking, right now, today - these companies will hand it over. They have to. It’s baked into the infrastructure. Individual privacy is a losing game. You can’t opt-out of surveillance when participation in society requires using their platforms. But here’s what you can do: build parallel infrastructure that doesn’t feed their systems at all. When you run Nextcloud, you’re not just protecting your files from Google - you’re creating a node in a network they can’t access. When you run Vaultwarden, your passwords aren’t sitting in a database that can be subpoenaed. When you run Jellyfin, your viewing habits aren’t being sold to data brokers who sell to ICE. I watched my local municipal fiber network get acquired by TELUS. I watched a piece of community infrastructure get absorbed into the corporate extraction machine. That’s when I realized: we can’t rely on existing institutions to protect us. We have to build our own. This isn’t about being a prepper or going off-grid. This is about building infrastructure that operates on fundamentally different principles:

Communication that can’t be shut down: Matrix, Mastodon, email servers you control

File storage that can’t be subpoenaed: Nextcloud, Syncthing

Passwords that aren’t in corporate databases: Vaultwarden, KeePass

Media that doesn’t feed recommendation algorithms: Jellyfin, Navidrome

Code repositories not owned by Microsoft: Forgejo, Gitea

Every service you self-host is one less data point they have. But more importantly: every service you self-host is infrastructure that can be shared, that can support others, that makes the parallel network stronger. Where to start if you’re new:

Passwords first - Vaultwarden. This is your foundation. Files second - Nextcloud. Get your documents out of Google/Microsoft. Communication third - Matrix server, or join an existing instance you trust. Media fourth - Jellyfin for your music/movies, Navidrome for music.

If you’re already self-hosting:

Document your setup. Write guides. Make it easier for the next person. Run services for friends and family, not just yourself. Contribute to projects that build this infrastructure. Support municipal and community network alternatives.

The goal isn’t purity. You’re probably still going to use some corporate services. That’s fine. The goal is building enough parallel infrastructure that people have actual choices, and that there’s a network that can’t be dismantled by a single executive order. I’m working on consulting services to help small businesses and community organizations migrate to self-hosted alternatives. Not because I think it’ll be profitable, but because I’ve realized this is the actual material work of resistance in 2025. Infrastructure is how you fight infrastructure. We’re not just hobbyists anymore. Whether we wanted to be or not, we’re building the resistance network. Every Raspberry Pi running services, every old laptop turned into a home server, every person who learns to self-host and teaches someone else - that’s a node in a system they can’t control. They want us to be data points. Let’s refuse.

What are you running? What do you wish more people would self-host? What’s stopping people you know from taking this step?

EDIT: Appreciate the massive response here. To the folks in the comments debating whether I’m an AI: I’m flattered by the grammar check, but I’m just a guy in his moms basement with too much coffee and a background in municipal networking. If you think “rule of three” sentences are exclusive to LLMs, wait until you hear a tech support vet explain why your DNS is broken for the fourth time today.

More importantly, a few people asked about a “0 to 100” guide - or even just “0 to 50” for those who don’t want to become full time sysadmins. After reading the suggestions, I want to update my “Where to start” list. If you want the absolute fastest, most user-friendly path to getting your data off the cloud this weekend, do this:

The Core: Install CasaOS, or the newly released (to me) ZimaOS. It gives you a smartphone style dashboard for your server. It’s the single best tool I’ve found for bridging the technical gap. It’s appstore ecosystem is lovely to use and you can import docker compose files really easily.

The Photos: Use Immich. Syncthing is great for raw sync, but Immich is the first thing I’ve seen that actually feels like a near 1:1 replacement for Google Photos (AI tagging, map view, etc.) without the privacy nightmare.

The Connection: Use Tailscale. It’s a zero-config VPN that lets you access your stuff on the go without poking holes in your firewall.

I’m working on a Privacy Stack type repo that curates these one click style tools specifically to help people move fast. Infrastructure is only useful if people can actually use it. Stay safe out there.

  • motruck@lemmy.zip
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    8
    ·
    19 hours ago

    Are all these long form posts written with the help of AI? The length of posts here seem abnormally long for this type of forum. I’m not saying I don’t like it but I’m immediately skeptical when I see a giant post nowadays.

    • h333d@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      2
      ·
      18 hours ago

      I’m definitely a human, just a concerned poster who actually gives a damn about what’s happening to our digital privacy.

      I’ll take the “AI” comments as a compliment to my grammar, I guess, but it’s a bit sad that we’ve reached a point where structured thoughts and bullet points make people suspicious. I use the dashes and lists because I want this info to be readable, not because I’m a bot running on a server somewhere.

      I’ve spent enough time working in tech and volunteering with seniors to know that if you don’t lay things out clearly, the message gets lost. I’m just someone trying to help people get their tech privacy back. No LLM required. Just a lot of caffeine and a genuine annoyance with where Big Tech is heading.

      • someone@lemmy.today
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        17
        ·
        edit-2
        17 hours ago

        You’re a liar. No one is that influenced. The post is AI, your responses aren’t. Who are you?

        To everyone other than OP: this may be someone trying to collect data on people on lemmy and what their views are on the government. This person is lying and being deceptive. Something is off.

        • blind3rdeye@aussie.zone
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          10 hours ago

          You’re a liar. No one is that influenced.

          There are a lot of people in the world. Some feel passionately enough about certain topics to write long lemmy posts. And it doesn’t stop there. Some people actually physically do stuff in the real world too! So if you think typing a few paragraphs of text is too much effort for any real person, then I suggest you try to broaden your social circle.

        • Appoxo@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          13 hours ago

          Idc. I like sharing about my hobby.

          I shared so much data about myself and what I host, an intelligence officer could probably hack me easier by just reading my posts, than a malware attacker could ever achieve.

    • BoycottTwitter@lemmy.zip
      link
      fedilink
      English
      arrow-up
      11
      ·
      19 hours ago

      For what it’s worth I read the whole thing in what felt like one or two minutes and I don’t think I’m a particularly fast reader. I think it looks longer because there are not many blank lines. It seems well written but I guess I do slightly get that AI feeling too, it just might be because he/she is a good writer so now people think good writing is AI, sad it’s coming down to this.

      • Appoxo@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        13 hours ago

        Imagine.
        Having to dumb down your writing just because you don’t want users accuse you of being a bot/intelligence agency

    • BaconWrappedEnigma@lemmy.nz
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      19 hours ago

      This does not look like it was generated by an off-the-shelf LLM. It could be from a custom fine-tuned LLM (or even few shot) but it’s likely not written by vanilla ChatGPT, Gemini, etc…

      It can be really difficult to detect LLM written text but the easiest heuristics are:

      • Specific keywords
      • The use of three examples, often bullet points (Hah!)
      • “Final thoughts” or a summary

      That said, there are many techniques to make an LLM sound more like an author; so, you never really know…

      Final thoughts

      In conclusion: we can’t be sure, but at first glance, this looks like it was written by a human.

      And when the government comes knocking - and they are knocking, right now, today - these companies will hand it over

      EDIT:

      I have seen many people convert the em-dash into a single dash, much like OP uses. e.g.

      And when the government comes knocking - and they are knocking, right now, today - these companies will hand it over

      • Xylight‮@lemdro.id
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        This does sound like it was written by an off the shelf LLM. You can’t just rely on em dashes anymore, most LLMs don’t spam those anymore.

        When you tell a modern LLM to write a post like this, it’ll use a very LinkedIn-esque tone. It’ll spam short, active sentences, often preceded by a colon:

        Document your setup. Write guides. Make it easier for the next person. Run services for friends and family, not just yourself. Contribute to projects that build this infrastructure. Support municipal and community network alternatives.

        “Not this, but that” and the “rule of 3” are getting less useful as tells, but they are absolutely littered everywhere in this post.

        When you run Nextcloud, you’re not just protecting your files from Google - you’re creating a node in a network they can’t access.

        I quote this formatting as a joke for obvious LLM writing. I’ve never seen human writing with more than 3 of these in a single post.

        My guess is that this was written by Claude since it stays rather personally neutral if you don’t guide it that way.

        I made Claude generate a post like this and it’s a very similar tone.

        https://claude.ai/share/1d27b5eb-dd85-43a1-bddf-1289d8a77b0f

      • PhoenixAlpha@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        18 hours ago

        You forgot one more tell that this post is riddled with - “not x, but y”. The rule of 3 is also seen in general sentence structure as well as bullet points. Example:

        A woman was reduced to a data point in a database - threat assessment score, deportation priority level, case number - and then she was killed. Not by some rogue actor, but by a system functioning exactly as designed.

        Em-dash (probably), into rule of 3, into em-dash, into not x but y. That sentence is what made me suspicious but there are plenty of other examples.

        Well, that and…this killing had nothing to do with any of those points. The sentence sounds flashy but is completely wrong on closer examination. Almost like a…hallucination…ahem.

        • h333d@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          4
          ·
          18 hours ago

          @PhoenixAlpha I’ll be sure to tell my 10th-grade English teacher that her lessons on rhetorical devices are now considered hallucinations. If “not X, but Y” makes me a bot, then half the op-ed columnists in history are running on silicon.

          As for the Renee Good shooting, if you think the infrastructure of surveillance, license plate readers, and cross-referenced databases “had nothing to do” with how ICE operates in a city like Minneapolis, then you’re missing the forest for the trees. I’m not here to win a Turing test; I’m here because I’m tired of seeing tech used as a weapon, you know?

          • PhoenixAlpha@lemmy.ca
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            4
            ·
            15 hours ago

            The original hallucination:

            threat assessment score, deportation priority level, case number

            The new hallucination (also rule of 3):

            surveillance, license plate readers, and cross-referenced databases

            “Surveillance” and “databases” (what does cross-referenced even mean or add? LLMs like to output word salad) could be applicable, but only because they’re so damn vague. Yes, of course the government uses SQL.

            License plate readers, sure they were involved…except that wasn’t even one of the original points. Find a model with better context length…lol. They also have nothing to do with self-hosting. What are you gonna do, run your own license plate issuing server?

            Please, you can just say you used an LLM because English isn’t your first language or something. I’m literally giving you an out. It would be way less embarrassing than whatever you’re trying to accomplish.

            • h333d@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              7
              arrow-down
              1
              ·
              18 hours ago

              I am genuinely new to this platform and form of social media. Am trying my best to keep this to the conversation.

              • someone@lemmy.today
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                7
                ·
                17 hours ago

                It’s something someone could have generated on their own, but the diction and linguistic style is similar to AI.

                “Before you roll your eyes about this getting political - stay with me, because” - linguistic style of AI

                “Not by some rogue actor, but by a system functioning exactly as designed.” -linguistic style of AI

                “This isn’t about being a prepper or going off-grid. This is about building infrastructure that operates on fundamentally different principles:” -linguistic style of AI

                Your responses to people accusing you of being AI seem human. So who are you? What are you? Are you a government agent trying to do data collection on people? Why write the post with AI, basically trying to collect data on users here or get data about users, and then deny it’s AI when it clearly is?

                Yes, people are being influenced by AI writing styles but NO ONE IS THIS INFLUENCED. You’re fucking lying. FUCK YOU.

                • h333d@lemmy.worldOP
                  link
                  fedilink
                  English
                  arrow-up
                  11
                  arrow-down
                  2
                  ·
                  17 hours ago

                  Slow down, guy. You’re spiraling.

                  I’m a former tech support guy who worked for a muncipal fiber network and spent 5 years volunteering with seniors. If my writing sounds “structured,” it’s because I’ve spent my entire adult life explaining complex tech to people who didn’t grow up with it. You learn to use bullet points and clear if/then logic because that’s how you get people to actually understand things.

                  And the fed accusation? Think about it for two seconds. If I were a government agent trying to collect data, why on earth would I be telling people to move their passwords to a local Vaultwarden instance and their photos to an encrypted Immich box behind a Tailscale VPN? That’s literally the opposite of data collection lmao

                  • someone@lemmy.today
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    arrow-down
                    6
                    ·
                    17 hours ago

                    Your post is CLEARLY written by AI. Your responses aren’t. So you’re being deceptive.

                    Your posting in a self-hosted community, preaching self-hosting to people who already do it. You could very well be trying to identify people who hold more unusual views about technology and harbor anti-governemnt sentiments. You think people here are stupid? You’re clearly a liar and probably working for someone. No one lies like that without an agenda.

        • PhoenixAlpha@lemmy.ca
          link
          fedilink
          English
          arrow-up
          2
          ·
          18 hours ago

          On another read, I would bet that this paragraph was originally bullet points.

          Communication that can’t be shut down: Matrix, Mastodon, email servers you control File storage that can’t be subpoenaed: Nextcloud, Syncthing Passwords that aren’t in corporate databases: Vaultwarden, KeePass Media that doesn’t feed recommendation algorithms: Jellyfin, Navidrome Code repositories not owned by Microsoft: Forgejo, Gitea

    • Rimu@crust.piefed.social
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      7
      ·
      18 hours ago

      Yes, it is a LLM. Congrats on being one of the very few who noticed.

      It even generated “you’re absolutely right” once. Also replied to its own post as if replying to someone else.

      • PhoenixAlpha@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        16 hours ago

        Once? Try every single comment before this particular chain, except one. Sure it only generated that exact phrase once, but they’re all variations on you’re right, or that hits hard, or you nailed it, or whatever.