Hi everyone, I posted about my Safebox project earlier, but now I’d like to hear your thoughts on something a bit broader. I’ve been noticing a pattern in self-hosting communities, and I’m curious if others see it too.

Whenever someone asks for a more beginner-friendly solution, something with a UI, automated setup, or fewer manual configs, there’s often a response like: “If you can’t configure Docker, reverse proxies, and Yaml files, you shouldn’t be self-hosting.”

Sometimes it feels like a portion of the community views complexity as a badge of honour. Don’t get me wrong, I love the technical side of self-hosting. I enjoy tinkering, breaking things, fixing them, learning along the way. That’s how most of us got into it.

But if we want more people to own their data, escape Big Tech, and embrace open-source alternatives, shouldn’t we welcome solutions that lower the entry barrier?

There’s room for:

  • people who want full control and custom setups
  • people who want semi-manual but guided
  • people who want it to work with minimal friction

Just like not every Linux user compiles from source, but they’re still Linux users.

Where do you stand? Should self-hosting stay DIY only or is there value in easier, more accessible ways to self-host?

Safebox aims to make self-hosting more approachable without sacrificing data ownership, so I genuinely want your honest take before releasing it more widely.

Some technical highlights of the project, for those interested:

Safebox runs on Linux, macOS, and Windows, supports both x86 and ARM64 (including Raspberry Pi, Banana Pi, and others), and handles domain/subdomain setup, Let’s Encrypt certificates, DNS configuration, reverse proxy (nginx), and also offers WireGuard-based remote access.

The project is currently in beta, and we’d really appreciate feedback from anyone interested in testing it, whether it’s about usability, stability, features, design, or honestly anything at all. You can find all the info about beta testing on our Discord channel.

If you’d like to try it out, check the Github repo: https://github.com/safeboxnetwork/framework-scheduler

Website: https://safebox.network/

Discord: https://discord.gg/aBP8bz6N8J

Thanks in advance to anyone who gives it a look or shares their thoughts.

  • Mio@feddit.nu
    link
    fedilink
    arrow-up
    2
    ·
    7 hours ago

    I think you are aiming for people that don’t want to learn maintenance work. This means you have to take care of that part.

    This means protect the OS from crashing when an app fill up the disk. Security. Upgrade the applications and the OS itself. Perform backup and rollback if something goes wrong. Add/removal off harddisks. Handle hardware failure and inform the user what they need to replace. Migrating to a new server.

    • drebora@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      3 hours ago

      Yes, that is kind of the case. Our goal and plan for the future is to offer an alternative with features you mentioned above. Safebox is currently in mvp state with limited features. If you take a look at the actual dashboard you can notice “monitoring” and “disk management” features alongside “backup”(both on Lan and geo-redundant between fellow users) will be available and updates for the OS and apps are already working it can be found (temporarily) under “notifications”. At the moment we looking for early user feedbacks and testing demand.

    • drebora@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      3 hours ago

      Safebox is currently in mvp state, heavily under developement, and we looking for early user feedbacks. We created the dc server as a way to recieve these feedbacks and to lay the foundation for the future community.

    • ByteOnBikes@discuss.online
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      11 hours ago

      These platforms are a gateway drug to open source.

      I got more folks into Linux using Reddit than I have anywhere else.

  • Flatfire@lemmy.ca
    cake
    link
    fedilink
    arrow-up
    15
    ·
    edit-2
    21 hours ago

    A couple points:

    • Your website does not properly convey the technical context of Safebox. Docker is a complex platform, and asking someone to install it point blank on any OS, while also championing ease-of-access feels at odds here.
    • There is a severe lack of documentation about the tool. Discord is not an appropriate means to find these documents if they exist. It is rarely okay as a support channel.
    • I saw your post from a few days ago, but it was framed as a question about about gatekeeping specifically. The post also advertised Safebox. Given that the post no longer exists (but the comments sure do), I’m inclined to think you didn’t get quite the answer you were looking for.

    I dove into self-hosting several years ago and ultimately I think I found the experience quite welcoming. I also don’t know that Safebox has a lot to offer over well-established alternatives these days like Unraid or TrueNAS, which have large user-bases and a depth of support articles to help admins better understand what they’re doing and how to do it. It’s true that not everyone would want to do this as a hobby. No one wants their services to break, or their data to be lost, and more tools that make it easier to prevent these scenarios are helpful. With that in mind, I am not left with a clear understanding of how Safebox is meant to provide safeguards here.

    I used the word “admin” in the previous paragraph for good reason. Self-hosting makes you the administrator, and it means that you, the administrator, have the power to make mistakes. My recommendation is not to talk down to your users. Someone interested in self-hosting should be aware of the potential security implications of what they’re taking on, alongside the risk to their data and that breaking changes are something they can and will make along the way. If you really want to make self-hosting accessible, then the documentation for your tool needs to be accessible too.

    Safebox runs on Linux, macOS, and Windows, supports both x86 and ARM64 (including Raspberry Pi, Banana Pi, and others), and handles domain/subdomain setup, Let’s Encrypt certificates, DNS configuration, reverse proxy (nginx), and also offers WireGuard-based remote access.

    A user should be able to learn why these elements are important and how they work together. Talk about the limitations of running it on a raspberry pi vs a workstations or server. What’s a reverse proxy? Is WireGuard good? This doesn’t mean the average person needs to know how to configure detailed permissions or application configs, and if the goal is to provide a repository of pre-hardened Docker configs for use then that’s cool too, but there should never be a barrier to the information itself. Especially as it is relevant to the tool you’ve built.

    I think that fundamentally, you’ve built a good tool that simplifies things someone who is already familiar with its components, and where it needs to improve is by expanding to help new users familiarize themselves. Education is as big a part of accessibility as the ease-of-setup.

    • drebora@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      3 hours ago

      Thanks your detailed feedback, I’ll try to go through all your points.

      When we said Docker, we meant the desktop version, basically so anyone can try Safebox on their own desktop and check out the early product. We also added an auto docker install for server setups a few days ago.

      You’re right about the docs, they’re still in the works, and proper documentation will be released soon.

      That other post you mentioned got a bit too heated, so the mods took it down. Definitely wasn’t our intention to stir up tension, and it wasn’t about not liking the answer or linking it to the product. Right now we’re mainly looking for early feedback and for people curious enough to help test things out.

      Thanks for explaining your point of view and your suggestions. It means a lot for us in this early state, and looking forward of any future feedback of your about the actual product.

    • Cooper8@feddit.online
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 hours ago

      As a non-coder interested in self hosting and somewhat aware of cybersecurity, this is the most relevant take for me.

      An application that facilitates safe self-hosting of many different service is great, however for it to be actually safe and useful it must either be a cybersecurity service keeping up with the pace of threats (which is essentially the corporate closed source model) or from the ground up be an educational platform as much as an application. Documentation needs to not only be comprehensive, but also self-explanitory to a non-technical audience. It is not enough to state that a setting or feature exists, it must also be made clear why it should be used and what the consequences of different configurations are.

      This approach is almost never done effectively by FOSS projects unfortunately. Fortunately I think we are at the point where it is completely feasible for this type of educational approach to be fully replicable and adaptable from a creative commons source to the specific content structure of the application user manual using LLMs (local ones). The big question is, what is the trusted commons source of this information? I suppose there are MIT and other top university courses published for open use online that could serve as the source material, but it seems like there is likely a better formatted “IT User Guide Wiki” and “Cybersecurity Risk and Exploit Alert List” with frequent updates out there that I’m not aware of, perhaps the annals of various cybersecurity and IT associations?

      Anyway I’m aware this is basically calling for another big FOSS project to build a modular documentation generator, but man would it help a lot of these projects be viable for a wider audience and build a more literate public.

      • drebora@lemmy.mlOP
        link
        fedilink
        arrow-up
        1
        ·
        2 hours ago

        We created Safebox mainly to make self-hosting easier, and proper, complete documentation is definitely something we want to provide, it’s already in the works. We also thought a lot of people might learn from it, but the scope is huge, so we’re still figuring out the right balance.

        Should we cover the basic concepts too? How deep should we go? Introducing the software itself is the easy part, explaining all the related concepts in a clear, non-technical way is the real challenge.

        Our goal isn’t to turn Safebox into a full-on cybersecurity course, but we do want users to understand what’s happening and why certain features matter, so they don’t feel lost.

        As for the sources you mentioned, I have to admit I’m not entirely sure either. During my university studies I only touched on cybersecurity partially, mostly around the risks users face and how they respond. Yes, there definitely needs to be some basic guidance on security, what the main risks are and how to keep yourself safe. Honestly, I think this could work even better as a community project, where different people can contribute their own approaches and share experiences on how they protect their setups and what has worked for them.

  • mierdabird@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    18 hours ago

    I think your project has admirable goals, but things like Cosmos Cloud and Casa OS already aim to address this. I think it would be useful for you to show what value proposition yours brings versus their apps, e.g. which parts of selfhosting you think your app handles better. I also agree with @[email protected] in that much more documentation is needed so the user can educate themselves how the back end works.

  • CameronDev@programming.dev
    link
    fedilink
    arrow-up
    31
    arrow-down
    2
    ·
    1 day ago

    Sometimes it feels like a portion of the community views complexity as a badge of honour.

    Its not this, it’s that there are very serious risks to self hosting (dataloss, hacks etc), and if they aren’t prepared for them, itll be catastrophic.

    The gatekeeping isnt just for fun, there are actual risks and downsides.

    As for prepackaging an appliance, we already have a model for how that plays out. There are millions of ISP provided routers and IoT things, and every other day there is a new breach involving them.

    • cRazi_man@europe.pub
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      21 hours ago

      How can security be made accessible? I’m a noob at self-hosting (I can deploy Docker containers and all that). There are loads of guides for beginners. I haven’t found any accessible info about security to learn from in an incremental way. Surely the advice can’t be that self-hosting shouldn’t be done till you’ve done a undergraduate qualification worth of learning about cyber security first.

      • CameronDev@programming.dev
        link
        fedilink
        arrow-up
        3
        ·
        18 hours ago

        I dont know. I’m in an adjacent industry, and even amongst some of my colleagues who do have degrees, there are some significant knowledge gaps. Companies often have entire teams dedicated to cyber security, and still get this wrong.

        There are just so many subtleties that need to be done right. I’m pretty certain that even my setup isnt properly secure, and the only reason things haven’t crashed down is pure luck.

        The appliance model is probably the best way to enforce security practices for regular users, but that pushes significant control/responsibility back to the supplier (they must stay up to date with patches, force push out updates so no one is left behind, limit flexibility so everyones setup is relatively homogeneous). Done right (for security), that costs a lot of money, so likely a subscription model. And it rapidly becomes a “cloud” service that runs off your own electricity, which loses all the self hosting benefits.

        • cRazi_man@europe.pub
          link
          fedilink
          English
          arrow-up
          4
          ·
          13 hours ago

          OK, so I’ve spent a load of time on this today. Searching for “self-hosting security” mostly brings up mostly home surveillance camera results.

          I’ve found this resource and have implemented his recommendations. Finally a good resource and I’m feeling much better after hardening SSH access, closing open ports in the firewall, installing Fail2Ban, etc.

          • CameronDev@programming.dev
            link
            fedilink
            arrow-up
            2
            ·
            12 hours ago

            I would encourage you to setup wireguard or tailscale, so that you dont have to expose SSH at all, but SSH hardening is definitely a good start.

            Worth monitoring your SSH logs as well, that’ll give you an idea of how constant the automated attacks can be. Even when I was using a non-standard port, I was getting heaps of attacks.

            • cRazi_man@europe.pub
              link
              fedilink
              arrow-up
              3
              ·
              edit-2
              5 hours ago

              I’ve got to figure that out still. Each step is a lot of learning and troubleshooting. I’ve changed the SSH port, deactivated root login, deactivated password login and left the passkey token on only my desktop PC with Fail2Ban. I’m waiting till I have another weekend I’m not at work to figure out VPN access. I’m using Synology reverse proxy so I hope I’m secure enough for now anyway.

    • nfreak@lemmy.ml
      link
      fedilink
      English
      arrow-up
      19
      ·
      1 day ago

      Shoutout to that dude last week posting a fully public fileshare service because he wanted to “practice” selfhosting

  • irmadlad@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    24 hours ago

    there’s often a response like: “If you can’t configure Docker, reverse proxies, and Yaml files, you shouldn’t be self-hosting.”

    This is the part that I don’t like. Couple this with condescending labels like ‘normies’ et al, I can kind of understand why selfhosting is still something that only a small segment of the population engages in. I realize that people like to differentiate themselves from others. It doesn’t matter if you’re collecting stamps or you’re the tiddlywinks champion of the world, we like to draw a line between ‘us’ and ‘them’, which is a pretty poignant song by Pink Floyd btw.

    As @[email protected] pointed out, there are very serious consequences to self hosting too. The first Linux server I stood up got taken over fairly quickly, and over night began attacking other servers. That’s serious shit and the owners of said servers don’t take it lightly, and rightfully so. The owners of the platform you may be hosting on don’t take it lightly either. So, yeah, there are some basics one needs to learn and implement before they can begin a successful, resilient, hardened, server, and it’s not a lot of point and click solutions. Again…shit’s complex. It’s why there are so many specialists in the field, but now you as the selfhoster have to wear all the admin hats.

    The doors to selfhosting should swing wide for all, and I try to be as accommodating as I possibly can because I know how I struggle and have struggled with things from time to time.

    Safebox looks pretty interesting. I’ve often thought, if I were a much younger man, I would’ve loved to produce a type of ‘server in a box’. But I am well past being a younger man, so I’ll leave that up to you young guns.

  • Broken@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    20 hours ago

    I believe self hosting should be made easier. Definitely easier to understand.

    If its not going to be that, then the opinion that people should self host is flawed. Not everybody can self host. They don’t have the knowledge or time to commit to it. So either it’s wrong to not have a better entry to them or it’s wrong to say they should self host.

    I don’t self host much. What I do I keep with local access only. Why? Because while I’m no dummy, I also am very out of touch with modern tech and don’t have the time or energy to learn what I need to for it to be done right.

  • voracitude@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    1 day ago

    This is a cool project, I have quite a few questions! Are you planning an “app store” repo of supported software? Allowing us to add our own repos? Can i set up a reverse proxy/VPN tunneling using my own hardware, or is remote access only available through a Safebox subscription? If I can set it up is that manual, guided, or automatic? Why Docker instead of Podman?