# Your Personal Cloud

You can host your own cloud server at home using commodity hardware and open-source software.

# Welcome

You may know how to install a program on your computer, but might not even know where to start when asked how the cloud works. This is to be expected – that's how they were designed!

![Home Page V2.png](https://hub.subspace.services/uploads/images/gallery/2025-06/scaled-1680-/home-page-v2.png)

Modern [open-source software](https://hub.subspace.services/books/an-open-ecosystem/page/an-open-ecosystem "An Open Ecosystem") can offer [familiar online services](https://hub.subspace.services/books/services/chapter/selecting-your-services "Selecting Your Services") and put you in complete control. Host a [personal website](https://hub.subspace.services/books/wordpress "Personal Websites"), build a [private cloud](https://hub.subspace.services/books/owncloud "Personal Cloud"), or share with an [online community](https://hub.subspace.services/books/hardware/page/workstation-computer "Communication & Community"). Connect your server to the World Wide Web with a [domain name](https://hub.subspace.services/books/world-wide-web/chapter/domain-name-system "Domain Name System") and modern router, or access all your services while away using a [virtual private network](https://hub.subspace.services/books/privacy-security/page/virtual-private-network "Virtual Private Network").

<span class="icon-header" style="background-color: #268bd2;"><span class="material-symbols-outlined" style="height: 100px !important;"> cloud</span>[What is the Cloud?](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud)</span>

In this five-part series, we will learn about the “cloud” – from the ground up – and use this new knowledge to [build our own server](https://hub.subspace.services/books/hardware/page/what-is-a-server "What is a Server?"). Aside from your curiosity, all you need to bring is an unused computer system – an excellent reason to [explore the low-cost Raspberry Pi or repurpose an old computer](https://hub.subspace.services/books/your-personal-cloud/page/computer "Computer").

<details id="bkmrk-%C2%A0"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Flag</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**0. Your Personal Cloud**](https://hub.subspace.services/books/your-personal-cloud "Your Personal Cloud")

- [Welcome](https://hub.subspace.services/books/your-personal-cloud/page/welcome "Welcome")
- [What is the Cloud?](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud "What is the Cloud?")
- [Getting Started](https://hub.subspace.services/books/your-personal-cloud/page/getting-started "Getting Started")
- [Background](https://hub.subspace.services/books/your-personal-cloud/page/background "Background")
- [Understanding the Requirements](https://hub.subspace.services/books/your-personal-cloud/chapter/understanding-the-requirements "Understanding The Requirements")
- [About the Author](https://hub.subspace.services/books/your-personal-cloud/page/about-the-author "About the Author")

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Host</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**1. Hardware**](https://hub.subspace.services/books/hardware "Hardware")

- [What is a Server?](https://hub.subspace.services/books/hardware/page/what-is-a-server "What is a Server?")
- [Community Impact ](https://hub.subspace.services/books/hardware/page/community-impact "Community Impact")
- [Quick-Start Examples](https://hub.subspace.services/books/hardware/chapter/quick-start-examples "Quick-Start Examples")
- [Layers of Computing](https://hub.subspace.services/books/hardware/page/layers-of-computing "Layers of Computing")
- [Firmware Configuration ](https://hub.subspace.services/books/hardware/chapter/firmware-configuration "Firmware Configuration")

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Terminal</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**2. Software**](https://hub.subspace.services/books/software "Software")

- [What is Linux?](https://hub.subspace.services/books/software/page/what-is-linux "What is Linux?")
- [An Open Ecosystem ](https://hub.subspace.services/books/software/page/an-open-ecosystem "An Open Ecosystem")
- [Installing an Operating System](https://hub.subspace.services/books/software/chapter/installing-an-operating-system "Installing an Operating System")
- [Configuring Debian](https://hub.subspace.services/books/software/chapter/configuring-debian "Configuring Debian")
- [Building Community](https://hub.subspace.services/books/software/page/building-community "Building Community")
- [Collectives and Identity](https://hub.subspace.services/books/software/page/collectives-and-identity "Collectives and Identity")
- [What is Docker?](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?")
- [Installing Docker](https://hub.subspace.services/books/software/chapter/installing-docker "Installing Docker")

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Cloud</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[3. Services](https://hub.subspace.services/books/services "Services")**

- [What is a Service?](https://hub.subspace.services/books/services/page/what-is-a-service "What is a Service?")
- [Considerations](https://hub.subspace.services/books/services/page/considerations "Considerations")
- [Evaluating Safety](https://hub.subspace.services/books/services/page/evaluating-safety "Evaluating Safety")
- [Selecting Your Services](https://hub.subspace.services/books/services/chapter/selecting-your-services "Selecting Your Services")
- [Managing Services](https://hub.subspace.services/books/services/page/managing-services "Managing Services")
- [Home Page](https://hub.subspace.services/books/services/page/home-page "Home Page")

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Build</span></td><td style="border-width: 0px; padding: 5px;">**[4. Monitoring &amp; Maintenance](https://hub.subspace.services/books/monitoring-maintenance "Monitoring & Maintenance")**

- [Sustainable Solutions](https://hub.subspace.services/books/monitoring-maintenance/page/sustainable-solutions "Sustainable Solutions")
- [Network Access](https://hub.subspace.services/books/monitoring-maintenance/chapter/network-access "Network Access")
- [Backup Solutions](https://hub.subspace.services/books/monitoring-maintenance/chapter/backup-solutions "Backup Solutions")
- [Administration](https://hub.subspace.services/books/monitoring-maintenance/page/administration "Administration")
- [Troubleshooting](https://hub.subspace.services/books/monitoring-maintenance/page/troubleshooting "Troubleshooting")
- [Cleaning](https://hub.subspace.services/books/monitoring-maintenance/page/cleaning "Cleaning")

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Language</span></td><td class="align-left" style="border-width: 0px; padding: 5px;">**[5. World Wide Web](https://hub.subspace.services/books/world-wide-web "World Wide Web")**

- [What are Computer Networks?](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?")
- [How to Remotely Connect](https://hub.subspace.services/books/world-wide-web/page/how-to-remotely-connect "How to Remotely Connect")
- [Virtual Private Network](https://hub.subspace.services/books/world-wide-web/chapter/virtual-private-network "Virtual Private Network")
- [Web Domain Name](https://hub.subspace.services/books/world-wide-web/chapter/web-domain-name "Web Domain Name")
- [Digital Stewardship](https://hub.subspace.services/books/world-wide-web/page/digital-stewardship "Digital Stewardship")
- [Security &amp; Privacy](https://hub.subspace.services/books/world-wide-web/chapter/security-privacy "Security & Privacy")
- [Router Configuration](https://hub.subspace.services/books/world-wide-web/chapter/router-configuration "Router Configuration")
- [What Next?](https://hub.subspace.services/books/world-wide-web/page/what-next "What Next?")

  
</td></tr></tbody></table>

</details>Through educational do-it-yourself guides we explore the [hardware](https://hub.subspace.services/books/hardware "Hardware") and [software](https://hub.subspace.services/books/software "Software") [requirements](https://hub.subspace.services/books/your-personal-cloud/page/computer "Knowing Your Requirements") for a home server, including [quick-start examples](https://hub.subspace.services/books/hardware/chapter/quick-start-examples "Quick-Start Examples"). This process uses [Debian Linux](https://hub.subspace.services/books/software/page/what-is-linux "Debian") and [Docker](https://hub.subspace.services/books/software/page/what-is-docker "Docker") to quickly self-host your [services](https://hub.subspace.services/shelves/services "4) Self-Hosted Services") through the browser-based interface.

[<button class="nav-button" type="button">Get Started</button>](https://hub.subspace.services/books/your-personal-cloud/page/getting-started "Getting Started")

# What is the Cloud?

[Computers](https://en.m.wikipedia.org/wiki/Computer) are machines that can automatically process data based on defined rules – like [logic](https://en.m.wikipedia.org/wiki/Logical_operations) and [arithmetic](https://en.m.wikipedia.org/wiki/Arithmetic). Humans have long explored purpose-built "analog" machines that perform specific tasks, such as the [Antikythera mechanism](https://en.m.wikipedia.org/wiki/Antikythera_mechanism) from 200 BCE for calculating the position of stars and planets.

[![1000001428.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001428.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001428.jpg)[Reconstruction](https://commons.m.wikimedia.org/wiki/File:Antikythera_model_front_panel_Mogi_Vicentini_2007.JPG#file)

By the early 1900s, the programmable computer theorized by [Charles Babbage](https://en.m.wikipedia.org/wiki/Charles_Babbage) and [Ada Lovelace](https://en.m.wikipedia.org/wiki/Ada_Lovelace) was finally demonstrated. While analog computers could reliably perform a pre-defined task, the Analytical Engine was the first to be "[Turing-complete](https://en.m.wikipedia.org/wiki/Turing_completeness)".

[![1000001429.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001429.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001429.jpg)[Analytical Engine](https://commons.m.wikimedia.org/wiki/File:Babbages_Analytical_Engine,_1834-1871._(9660574685).jpg)

This new class of computers was capable of being programmed to perform specific tasks – like multiplication or conditional statements. This not only made computers more versatile, but ensured similar systems could share their programming.

## Digital Systems 

These first computers bear little resemblance to the discrete personal computers we use today. Analog systems used physical properties to perform their computations – such as connecting a circuit to turn on a warning light when the temperature within the room exceeds a certain threshold.

The first "[digital](https://en.m.wikipedia.org/wiki/Computer#Digital_computers)" general-purpose computers were created in the early–mid 20th century. These systems transmit and process electrical signals to achieve the desired outcome. [Colossus](https://en.m.wikipedia.org/wiki/Colossus_computer) and [ENIAC](https://en.m.wikipedia.org/wiki/ENIAC) were both digital and programmable – meaning that the hardware could be instructed to perform new tasks even after the computer had been built.

<p class="callout info">Women were the first "[computers](https://en.m.wikipedia.org/wiki/Computer_(occupation))" – tasked with maintaining the programming necessary to operate the first general-purpose digital computer systems.</p>

<table border="1" class="align-center" id="bkmrk-" style="border-collapse: collapse; border-width: 0px;"><colgroup><col style="width: 50%;"></col><col style="width: 50%;"></col></colgroup><tbody><tr><td style="border-width: 0px;">[![1000006937.webp](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006937.webp)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006937.webp)

[ENIAC](https://en.m.wikipedia.org/wiki/ENIAC)

</td><td style="border-width: 0px;">[![1000006947.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006947.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006947.jpg)

[Colossus](https://en.m.wikipedia.org/wiki/Colossus_computer)

</td></tr></tbody></table>

By the 1960s, digital computers were becoming more commonplace at large institutions, but were still largely inaccessible to many professionals and researchers, let alone everyday consumers. While hardware advances allowed computers to perform more complex tasks, software revolutionized the number of tasks that could be performed at once.

## Local Sharing

[Time sharing](https://en.m.wikipedia.org/wiki/Time-sharing) became a technique that allocated computer resources to multiple users, enabling true multi-tasking for the first time. In the past, programs ran in sequence and completely finished a single task before moving onto the next. Now, each user could run their own program and the computer would quickly cycle through each user's task, performing a little bit of each at a time.

<div drawio-diagram="795"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1743811145.png" alt=""/></div>

People could connect to this shared computer system through a "[terminal](https://en.wikipedia.org/wiki/Computer_terminal)" – or a keyboard and monitor that transmitted data back and forth over a physical cable. This maintained the illusion of a personal computer that ran only their task when, in reality, it was a shared computer. Before the internet was even invented, we had begun our exploration into the concept of the modern "cloud".

<table border="1" id="bkmrk--3" style="border-collapse: collapse; width: 99.9779%; border-width: 0px;"><colgroup><col style="width: 99.9779%;"></col></colgroup><tbody><tr><td style="border-width: 0px;">[![1000006938.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006938.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006938.jpg)

[ADM-3A](https://en.m.wikipedia.org/wiki/ADM-3A)

</td></tr></tbody></table>

Time sharing was expanded upon to create [virtualization](https://en.m.wikipedia.org/wiki/Virtualization) – or dividing a single computer into multiple virtual computers. This allowed the creation of isolated enclaves where each user – whether a person or corporation – could securely run their own programs without worrying about sharing resources.

<div drawio-diagram="776"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1743634017.png" alt=""/></div>

## Interconnection

In 1969, [ARPANET](https://en.m.wikipedia.org/wiki/ARPANET) (Advanced Research Projects Agency Network) marked the birth of the long-distance Internet. During this time, the foundations were laid for the [same "TCP/IP" standards](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?") we still use to this day. Using these new tools, researchers (and their computers) could share their resources across vast distances.

[![Arpanet_in_the_1970s.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/arpanet-in-the-1970s.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/arpanet-in-the-1970s.png)[ARPANET](https://en.m.wikipedia.org/wiki/ARPANET)

By 1991, the World Wide Web as we know it was released to global consumers. With a subscription to an [internet service provider](https://en.m.wikipedia.org/wiki/Internet_service_provider), anyone could connect to the [World Wide Web](https://en.m.wikipedia.org/wiki/World_Wide_Web). Before the turn of the century, the [first theory](https://en.m.wikipedia.org/wiki/History_of_cloud_computing) of [cloud computing](https://en.m.wikipedia.org/wiki/Cloud_computing) defined a foundation for scalable servers.

This enabled independent computers to be linked together over a network and share their resources towards supporting a unified service. [Distributed computing](https://en.m.wikipedia.org/wiki/Distributed_computing) enabled websites to support a hundred thousand users by balancing the work load across multiple computers instead trying to juggle everyone using one system.

<div drawio-diagram="809"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1743818203.png" alt=""/></div>

Whenever a service was accessed over the internet, the user could be [geo-located](https://en.m.wikipedia.org/wiki/Internet_geolocation) and directed to the server that was closest to them. This provided a better connection, split the workload and created more space for data storage. As a result, [data centers](https://en.m.wikipedia.org/wiki/Data_center) quickly proliferated across the globe.

## Data Centers

By the early 2000s, technology companies had invested heavily into data center infrastructure. Through this model, businesses could forego hosting their own server computers and instead rely on the infrastructure maintained by someone else.

[![1000006969.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006969.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006969.jpg)[A typical server rack](https://commons.m.wikimedia.org/wiki/File:Rack001.jpg#mw-jump-to-license)

These distributed server farms became increasingly integrated into our every day lives – personally and professionally. [Google](https://en.m.wikipedia.org/wiki/Gmail) and [Apple](https://en.m.wikipedia.org/wiki/MobileMe#iTools) both released services targeting corporations and consumers, offering access to cloud-based tools. [Amazon](https://en.m.wikipedia.org/wiki/Amazon_Web_Services) introduced "cloud" [computing](https://en.m.wikipedia.org/wiki/Amazon_Elastic_Compute_Cloud) and [storage](https://en.m.wikipedia.org/wiki/Amazon_S3) services, enabling businesses to rent computer resources – like processing power or storage space.

<table border="1" class="align-center" id="bkmrk-arsat-data-center-go" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1466%;"></col><col style="width: 50.1466%;"></col></colgroup><tbody><tr><td>[![1000006966.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006966.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006966.jpg)

[ARSAT](https://en.m.wikipedia.org/wiki/ARSAT) Data Center

</td><td>[![1000006968.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006968.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/1000006968.jpg)

Google Data Center

</td></tr></tbody></table>

<p class="callout info">[Take a look](https://datacente.rs) at the data centers located near you – there's more than you'd think!</p>

Contemporary cloud computing combines virtualization, distributed computing, and [secure internet connections](https://en.m.wikipedia.org/wiki/Transport_Layer_Security) to build vast [server farm infrastructures](https://en.m.wikipedia.org/wiki/Server_farm) around the globe. By dividing up server clusters into isolated software environments, data centers create the digital equivalent of an apartment building housing multiple tenants.

When contracting out digital infrastructure services, corporations may lose physical ownership of data. Realistically, it can be nearly impossible to keep track of what data is stored where. Under this paradigm, corporations have the potential to shirk their responsibility for digital [stewardship](https://en.m.wikipedia.org/wiki/Stewardship) – or how they keep data safe, secure and up-to-date.

## Everything as a Service

The decentralized infrastructure of data centers has fomented considerable uncertainty about data privacy, unauthorized access and legal compliance. When [digital data exists outside the physical control of a company](https://en.m.wikipedia.org/wiki/Cloud_computing_issues), can they reliably ensure security? On the other hand, could leaving data storage up to industry professionals improve its baseline security?

Data centers, for better or worse, are the dominant paradigm and currently power much of the internet. They are now a driving force behind the proliferation and expansion of technologies around the globe. [Any digital service](https://en.m.wikipedia.org/wiki/As_a_service) can be provided as a [paid subscription](https://en.m.wikipedia.org/wiki/Subscription_business_model) using this pervasive business practice.

<div drawio-diagram="971"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1744928449.png" alt=""/></div>

This vast infrastructure has led to a standardized "cloud computing" service model focused on a granular spectrum. This dictates how much of the service is managed by the client versus the cloud computing service provider:

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Dns</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[Infrastructure as a Service](https://en.m.wikipedia.org/wiki/Infrastructure_as_a_service)**

The practice of a provider renting digital systems to clients to fulfill their needs – such as servers, networks and Internet service.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Code\_blocks</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[Platform as a Service](https://en.m.wikipedia.org/wiki/Platform_as_a_service)**

Subscription to service that facilitates the rapid deployment of software – such as platforms like [Docker](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?") and [Kubernetes](https://en.m.wikipedia.org/wiki/Kubernetes).

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Terminal</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Software as a Service**](https://en.m.wikipedia.org/wiki/Software_as_a_service)

Connects people, occasionally on behalf of an intermediary like a corporation or school, to web-based software – such as office and file-hosting services.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding-top: 5px; padding-right: 5px; padding-bottom: 5px;"><span class="material-symbols-outlined">Function</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Function as a Service** ](https://en.m.wikipedia.org/wiki/Software_as_a_service)

Specific functions to be completed and paid per usage – such as automated image or data processing.

</td></tr></tbody></table>

On one end, the client maintains complete control over how they can utilize their rented hardware. On the other, everything occurs completely behind-the-scenes without the client ever being aware.

<div drawio-diagram="818"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1743915574.png" alt=""/></div>

While these technologies were groundbreaking for creating global internet platforms, they have had countless impacts on [privacy](https://en.m.wikipedia.org/wiki/Leaky_abstraction) and [technology development](https://en.m.wikipedia.org/wiki/Fallacies_of_distributed_computing). You may [lose access to your data](https://www.wired.com/story/what-happens-when-a-romance-author-gets-locked-out-of-google-docs/) at any point because a service provider decides they don't want to host your content.

With its current trajectory, cloud computing threatens to completely [monopolize and privatize](https://www.frontlineclub.com/zizek_corporate_rule_of_cyberspace/) the very infrastructure that powers the Internet. It is currently estimated that more than [85% of global business are expected to adopt a "cloud-first" approach](https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences) by 2025.

Large-scale data centers use exponentially more power than a home server – consuming up to [100 times more than a standard office building](https://hub.subspace.services/attachments/2). For example, a small data center with 500 servers may require 1 megawatt of power – equivalent to [200 American households](https://www.integrityenergy.com/blog/is-data-center-energy-usage-driving-up-my-energy-bills/).

*Data Center Scale*

<table border="1" class="align-center" id="bkmrk-scale-servers-power-" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col></colgroup><thead><tr><td>Scale</td><td>Servers</td><td>Power Capacity</td></tr></thead><tbody><tr><td>Small</td><td>500 – 2,000</td><td>1 – 5 MW</td></tr><tr><td>Medium</td><td>2,000 – 10,000</td><td>5 – 20 MW</td></tr><tr><td>Large</td><td>10,000+</td><td>20 – 100 MW</td></tr></tbody></table>

Describe and illustrate difference between w kilowatt and megawatt

Similar to personal computers, data centers can enter idle states where they consumes less power. Entire server racks will turn on and off depending on how much work needs to be done. This will result in a [data center's power consumption fluctuating](https://www.serverwatch.com/virtualization/data-center-power-consumption/).

Globally, computer and network technologies are estimated to [consume 10% of all energy produced](https://news.cnrs.fr/articles/new-technologies-wasted-energies). Of this, data centers consume about 20% – with this expected to [continue rising with the rise of machine learning](https://www2.deloitte.com/us/en/insights/industry/technology/technology-media-and-telecom-predictions/2025/genai-power-consumption-creates-need-for-more-sustainable-data-centers.html). Two broad categories use nearly 80% of this power: hardware and cooling systems.

<sup class="reference"><span class="cite-bracket"><sup>[![1000000321.webp](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000321.webp)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000321.webp)</sup></span></sup>

<span class="cite-bracket">Power consumption for the ten largest global technology companies [outpace entire nations](https://www.bestbrokers.com/stock-brokers/big-techs-staggering-power-consumption-calculating-the-massive-electricity-bills-companies-pay-off-with-ease/)</span>.

[![1000000337.png](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000337.png)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000337.png)

Data centers are not necessarily bad, but they must be created with care and compassion for the community and ecosystem.

## Self-Hosting

[Federation](https://en.m.wikipedia.org/wiki/Federation_(information_technology)) is a foundational – yet still evolving –computing concept that enables services that are shared across multiple autonomous servers. In practice, this means that no one person can be the sole owner – anyone can host their own version of the service at any time.

By [decentralizing](https://en.m.wikipedia.org/wiki/Decentralized_web) the ownership of software, we can ensure no one has unilateral control. The [Fediverse](https://en.m.wikipedia.org/wiki/Fediverse) – or a federation of social networks – communicate using a standard protocol that allow them to work together while maintaining their individuality.

<div drawio-diagram="815"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1743911791.png" alt=""/></div>

By leveraging the same cloud technologies, anyone has the ability to host their own services. [Linux](https://hub.subspace.services/books/software/page/what-is-linux "What is Linux?"), [Docker](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?") and all of the necessary software are open-source, available for free to anyone. These softwares are developed by open communities to further both personal and professional interests – like security, privacy and convenience.

[Self-hosting](https://en.m.wikipedia.org/wiki/Self-hosting_(web_services)) is the practice of maintaining a privately owned server that is entirely within your control, instead of a third-party administrator. When running your own cloud server, you have the power – and responsibility – to act as an infrastructure, platform and software provider.

The growing momentum of cloud-based technology has made it easier than ever to host a server on your own personal hardware – even from home. The ascent of free and open-source software has created alternative to many of the web-based services – like remote storage, password managers, media streaming and an office suite.

<table border="1" class="align-center" id="bkmrk--10" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000000537.png](https://hub.subspace.services/uploads/images/gallery/2025-06/scaled-1680-/1000000537.png)](https://hub.subspace.services/uploads/images/gallery/2025-06/1000000537.png)</td><td>[![1000006268.png](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006268.png)](https://hub.subspace.services/uploads/images/gallery/2025-02/1000006268.png)</td></tr></tbody></table>

There are many benefits to hosting your own server – like control and cost-savings because you don't rely on third-parties to administer your services. As a result, the responsibility to maintain infrastructure falls squarely on you – including hardware, security, and legal compliance.

While this can seem daunting, there is no better way to start than by trying for yourself. In a world that rapidly favors the digital, hosting your own server can teach you invaluable skills. Growing communities – supported by hobbyists, developers and corporations alike – help support each other and the software.

<sup class="reference" id="bkmrk-%5B2%5D"></sup>

# Getting Started

This page will act as a guide through the five books that make up this lesson. We will be exploring how to self-host your own server from home using Do-It-Yourself guides paired with educational resources exploring the history of computing. Along the way, we will critically reflect on what it means for our communities to host your own server.

## 0. Background

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">info</span></span>

<details id="bkmrk-table-of-contents-fl"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Flag</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Your Personal Cloud**](https://hub.subspace.services/books/your-personal-cloud "Your Personal Cloud")

- [Welcome](https://hub.subspace.services/books/your-personal-cloud/page/welcome "Welcome")
- [What is the Cloud?](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud "What is the Cloud?")
- [Getting Started](https://hub.subspace.services/books/your-personal-cloud/page/getting-started "Getting Started")
- [Background](https://hub.subspace.services/books/your-personal-cloud/page/background "Background")
- [Understanding the Requirements](https://hub.subspace.services/books/your-personal-cloud/chapter/understanding-the-requirements "Understanding The Requirements")
- [About the Author](https://hub.subspace.services/books/your-personal-cloud/page/about-the-author "About the Author")

</td></tr></tbody></table>

</details>Before getting started, we should know what we're building. Running your own server is an excellent avenue to explore what it means to think like a designer and a developer. By taking ownership of our own [digital security and privacy](https://hub.subspace.services/books/privacy-security "Privacy & Security"), we can help protect our families and communities.

[<button class="nav-button" type="button">Project Description</button>](https://hub.subspace.services/books/your-personal-cloud/page/background "Project Description")

## 1. Hardware

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">host</span></span>

<details id="bkmrk-table-of-contents-ho"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-host-hardware-what-i" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Host</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Hardware**](https://hub.subspace.services/books/hardware "Hardware")

- [What is a Server?](https://hub.subspace.services/books/hardware/page/what-is-a-server "What is a Server?")
- [Community Impact ](https://hub.subspace.services/books/hardware/page/community-impact "Community Impact")
- [Quick-Start Examples](https://hub.subspace.services/books/hardware/chapter/quick-start-examples "Quick-Start Examples")
- [Layers of Computing](https://hub.subspace.services/books/hardware/page/layers-of-computing "Layers of Computing")
- [Firmware Configuration ](https://hub.subspace.services/books/hardware/chapter/firmware-configuration "Firmware Configuration")

</td></tr></tbody></table>

</details>Now that we [understand our hardware requirements](https://hub.subspace.services/books/your-personal-cloud/chapter/understanding-the-requirements "Knowing Your Requirements"), we need to [find a machine that supports them](https://hub.subspace.services/books/hardware/chapter/quick-start-examples "Quick-Start Examples"). We can create an [open-source server using consumer hardware](https://hub.subspace.services/books/hardware/page/what-is-a-server "What is a Server?"). Finally, there are some [firmware configuration](https://hub.subspace.services/books/hardware/chapter/firmware-configuration "Firmware Configuration") we should check before installing an operating system.

[<button class="nav-button" type="button">See the Hardware Guide</button>](https://hub.subspace.services/books/hardware "See the Hardware Guide")

## 2. Software

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">terminal</span></span>

<details id="bkmrk-table-of-contents-te"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-terminal-software-wh" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Terminal</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Software**](https://hub.subspace.services/books/software "Software")

- [What is Linux?](https://hub.subspace.services/books/software/page/what-is-linux "What is Linux?")
- [An Open Ecosystem ](https://hub.subspace.services/books/software/page/an-open-ecosystem "An Open Ecosystem")
- [Installing an Operating System](https://hub.subspace.services/books/software/chapter/installing-an-operating-system "Installing an Operating System")
- [Configuring Debian](https://hub.subspace.services/books/software/chapter/configuring-debian "Configuring Debian")
- [Building Community](https://hub.subspace.services/books/software/page/building-community "Building Community")
- [Collectives and Identity](https://hub.subspace.services/books/software/page/collectives-and-identity "Collectives and Identity")
- [What is Docker?](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?")
- [Installing Docker](https://hub.subspace.services/books/software/chapter/installing-docker "Installing Docker")

</td></tr></tbody></table>

</details>We need to [install Debian Linux](https://hub.subspace.services/books/software/chapter/installing-an-operating-system "Debian") onto our computer to form a foundation. We will use [Docker](https://hub.subspace.services/books/software/chapter/installing-docker "Docker") to create [secure, self-contained "virtual operating systems"](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?") that are easy to monitor and keep up-to-date. Importantly, we need to [create a backup](https://hub.subspace.services/books/monitoring-maintenance/chapter/backup-solutions "Backup Solutions") solution and [setup remote access](https://hub.subspace.services/books/monitoring-maintenance/chapter/network-access "Remote Access") for our server.

[<button class="nav-button" type="button">See the Software Guide</button>](https://hub.subspace.services/books/software "See the Software Guide")

## 3. Services

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">cloud\_circle</span></span>

<details id="bkmrk-table-of-contents-cl"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-cloud-services-what-" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Cloud</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[Services](https://hub.subspace.services/books/services "Services")**

- [What is a Service?](https://hub.subspace.services/books/services/page/what-is-a-service "What is a Service?")
- [Considerations](https://hub.subspace.services/books/services/page/considerations "Considerations")
- [Evaluating Safety](https://hub.subspace.services/books/services/page/evaluating-safety "Evaluating Safety")
- [Selecting Your Services](https://hub.subspace.services/books/services/chapter/selecting-your-services "Selecting Your Services")
- [Managing Services](https://hub.subspace.services/books/services/page/managing-services "Managing Services")
- [Home Page](https://hub.subspace.services/books/services/page/home-page "Home Page")

</td></tr></tbody></table>

</details>Through [Portainer](https://hub.subspace.services/books/portainer "Portainer"), an intuitive interface for installing Docker services through a browser. We will be using a simple structured syntax known as Docker Compose to pop-up services from pre-built images.

[<button class="nav-button" type="button">See the Services Guide</button>](https://hub.subspace.services/books/services "See the Services Guide")

## 4. Monitoring &amp; Maintenance   


<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">build\_circle</span></span>

<details id="bkmrk-table-of-contents-bu"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-build-monitoring-%26-m" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Build</span></td><td style="border-width: 0px; padding: 5px;">**[Monitoring &amp; Maintenance](https://hub.subspace.services/books/monitoring-maintenance "Monitoring & Maintenance")**

- [Sustainable Solutions](https://hub.subspace.services/books/monitoring-maintenance/page/sustainable-solutions "Sustainable Solutions")
- [Network Access](https://hub.subspace.services/books/monitoring-maintenance/chapter/network-access "Network Access")
- [Backup Solutions](https://hub.subspace.services/books/monitoring-maintenance/chapter/backup-solutions "Backup Solutions")
- [Administration](https://hub.subspace.services/books/monitoring-maintenance/page/administration "Administration")
- [Troubleshooting](https://hub.subspace.services/books/monitoring-maintenance/page/troubleshooting "Troubleshooting")
- [Cleaning](https://hub.subspace.services/books/monitoring-maintenance/page/cleaning "Cleaning")

</td></tr></tbody></table>

</details>When running your own server, it's important to have ways to monitor your system and perform any required maintenance. This server will always be operating which makes it even more important to take our system apart to remove dust and dirt.

[<button class="nav-button" type="button">See the Monitoring &amp; Maintenance Guide</button>](https://hub.subspace.services/books/monitoring-maintenance "See the Monitoring & Maintenance Guide")

## 5. World Wide Web

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">public</span></span>

<details id="bkmrk-table-of-contents-la"><summary>Table of Contents</summary>

<table border="1" class="align-center" id="bkmrk-language-world-wide-" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Language</span></td><td class="align-left" style="border-width: 0px; padding: 5px;">**[World Wide Web](https://hub.subspace.services/books/world-wide-web "World Wide Web")**

- [What are Computer Networks?](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?")
- [How to Remotely Connect](https://hub.subspace.services/books/world-wide-web/page/how-to-remotely-connect "How to Remotely Connect")
- [Virtual Private Network](https://hub.subspace.services/books/world-wide-web/chapter/virtual-private-network "Virtual Private Network")
- [Web Domain Name](https://hub.subspace.services/books/world-wide-web/chapter/web-domain-name "Web Domain Name")
- [Digital Stewardship](https://hub.subspace.services/books/world-wide-web/page/digital-stewardship "Digital Stewardship")
- [Security &amp; Privacy](https://hub.subspace.services/books/world-wide-web/chapter/security-privacy "Security & Privacy")
- [Router Configuration](https://hub.subspace.services/books/world-wide-web/chapter/router-configuration "Router Configuration")
- [What Next?](https://hub.subspace.services/books/world-wide-web/page/what-next "What Next?")

</td></tr></tbody></table>

</details>We will [configure our local network ](https://hub.subspace.services/books/local-networking "Local Networking")through our router to prepare for connection. We will use [SWAG](https://hub.subspace.services/books/world-wide-web/page/swag "SWAG"), a community-driven project to assist everyday people with creating a secure, self-hosted server. This solution uses a [reverse proxy server ](https://hub.subspace.services/books/reverse-proxies "Reverse Proxies")to route traffic from a domain address to your hosted services. Finally, we will configure your router to [connect your server](https://hub.subspace.services/books/world-wide-web/page/connecting-your-personal-server-to-the-internet "Connecting Your Personal Server to the Internet") to the internet.

[<button class="nav-button" type="button">See the World Wide Web Guide</button>](https://hub.subspace.services/books/world-wide-web "See the World Wide Web Guide")

# Background

Many people know how to install a computer program, but [wouldn’t even know where to begin if asked how the cloud works](https://wakefieldresearch.com/does-the-us-understand-cloud-computing/). Computers and their networks have been intentionally designed to be abstract – masking inner depths though a shared common language. These systems are a collective of parts working towards a shared desired outcome.

<div drawio-diagram="1049"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1745608990.png" alt=""/></div>

We leave a mark on the spaces left in our care and our personal decisions have reverberating effects that can be felt by others. When we create digital spaces, we must not forget the effect we have on our physical world – from the server in our garage to the data center down the street.

As we increasingly rely on [the Cloud](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud "The Cloud") (or digital services hosted on someone else's computer), we must consider how this affects our [personal privacy and security](https://hub.subspace.services/books/world-wide-web/page/digital-stewardship "Privacy & Security"). The “[Cloud](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud "What is the Cloud?")” has taken control over the way corporations handle digital infrastructure. We have the right to control our digital ecosystem.

<span class="icon-header" style="background-color: #268bd2;"><span class="material-symbols-outlined" style="height: 100px !important;"> cloud</span>[What is the Cloud?](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud)</span>

By 2025, an [estimated 96% of corporations](https://spacelift.io/blog/cloud-computing-statistics) will rely on it – with a [majority of data stored outside their business](https://explodingtopics.com/blog/corporate-cloud-data). Everyday consumers have been forced into the “[Cloud](https://hub.subspace.services/books/your-personal-cloud/page/what-is-the-cloud "What is the Cloud?")” alongside them. But, what does this mean and how does it work?

Open-source software solutions can put us back in control of our digital experiences. By joining these [open collaborative communities](https://hub.subspace.services/books/software/page/an-open-ecosystem-ik9 "An Open Ecosystem"), we can add diverse voices throughout their growth process.

## Learning Objectives

Anyone can learn to host their own server, but there are questions we need to ask ourselves before we do. How does power translate into responsibility?

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Hardware</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Practical**

Be able to assess computer hardware components, install a working operating system and host a simple web server using open-source cloud computing technologies.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Engineering</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Technical**

Understand the historical context, significance, and potential applications for cloud computing.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Diversity\_1</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Social**

Explore the role that cloud computing has on mediating the relationships between people, places, communities, and “Technology”.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Psychology</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Personal**

Critically analyze and assess your relationship with "Technology" and the vulnerabilities that can arise through reliance on them.

</td></tr></tbody></table>

Before you make the decision to build a server, it may be helpful to learn more about me – the author.

[<button class="nav-button" type="button">About the Author</button>](https://hub.subspace.services/books/your-personal-cloud/page/about-the-author "About the Author")

## What You'll Need   


Aside from curiosity and hardware, you will need to create the space for reflection – about yourself and your relation to others. While you don't need to know how to write code, you must be comfortable thinking critically and logically. Confidently communicating roadblocks will be a strength and help you succeed.

As for hardware requirements, you can fulfill each at various price points, including free and low-cost options where available.

<table border="1" class="align-center" id="bkmrk-desktop_windows-comp" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Desktop\_windows</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Computer**

*$50 – $1500*

You will need computer hardware to host your server. This can be anything from a [Raspberry Pi to a dedicated tower server](https://hub.subspace.services/books/hardware/page/what-is-a-server "What is a Server?"), new or refurbished. Create a budget server and upgrade it as the need arises.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">cable</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Accessories**

*$0 – $300*

You will need a display, mouse and keyboard to interact with your computer, as well as cables and a USB flash drive.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">language</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Internet Service**

*$30+/month*

You will need internet access for your home server. Preferably, it is a hardwired internet connection – such as cable or fiber – as opposed to wireless – like satellite.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Router</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Router**

*$50 – $150*

You will need a router that has [Port Forwarding](https://en.m.wikipedia.org/wiki/Port_forwarding) so it can forward traffic from the router to your home server. While not required, [Dynamic DNS](https://en.m.wikipedia.org/wiki/Dynamic_DNS) allows you to connect to your server without purchasing a domain name.

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Vpn\_lock</span></td><td style="border-width: 0px; padding: 5px;">**VPN Provider**

*Free to $9+/month*

A Virtual Private Network provider is an excellent way to maintain privacy and anonymity on the internet. While self-hosting services, they can hide personal information like [what you're downloading](https://hub.subspace.services/books/qbittorrent "qBittorrent •") or [what websites you're accessing](https://hub.subspace.services/books/adguard-home "AdGuard Home •").

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Domain\_verification</span></td><td style="border-width: 0px; padding: 5px;">**Domain Name**

*Free – $20,000*

Accessing our server over the internet will generally require a domain name – such as [example.com](https://example.com) – and there is a wide price variability.

</td></tr></tbody></table>

Before you commit yourself to this project, take this opportunity to explore everything you'll need to follow along. It's also important to reflect on how you will approach this learning experience.

[<button class="nav-button" type="button">Requirements</button>](https://hub.subspace.services/books/your-personal-cloud/chapter/understanding-the-requirements "Requirements")

## Format

"Your Personal Cloud" will be a five-part series, divided into five books through this digital repository. These will follow a book metaphor with chapters and pages, progressively leading the way through making your own server.

1. [Hardware](https://hub.subspace.services/books/hardware "Hardware")
2. [Software](https://hub.subspace.services/books/software "Software")
3. [Services](https://hub.subspace.services/books/services "Services")
4. [Monitoring &amp; Maintenance](https://hub.subspace.services/books/monitoring-maintenance "Monitoring & Maintenance")
5. [World Wide Web](https://hub.subspace.services/books/world-wide-web "World Wide Web")

This will not be just about *how* to do it, but also a reflection of *how and why* we arrived where we are. When we take back responsibility for our digital selves, we also gain the power and community to shape the digital world. Your perspective is vital for creating equitable technologies. Together, we can learn how to talk back and forge a new relationship with technology.

This is a self-led learning experience geared towards personal reflection on your own time and in your own space. Each book will contain do-it-yourself guides that progressively build on the last, standing as tangible milestones for your progress. We will explore why computers came to be, how we first connected them and what that means for global communities as we continue forward together.

<p class="callout info">These resources can be exported for your own personal archive.</p>

These books will provide quick links to community-crafted resources – like [Wikipedia](https://en.m.wikipedia.org) – to help place ideas within larger concepts. Links within the text to academic, corporate and community resources will attempt to lend weight to the claims. Illustrations, digrams and visual resources are heavily leveraged to express and communicate abstract concepts.

A Project Notebook is offered alongside these lessons to keep track of technical notes, as well as to provide a central space for reflection and brainstorming. This can be printed – or downloaded as a form-fillable PDF – to act as a reference throughout all five books.

## Process

We will be the same techniques and technologies used by many companies to host their own websites and cloud services. Created through community-powered projects, these technologies are robust enough for corporations while still accessible to someone looking to host a small home server.

<p class="callout success">All of the software you will need is offered free-of-charge by the original developers and can be downloaded from their servers.</p>

<table border="1" class="align-center" id="bkmrk-group_work-debian-th" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Group\_work</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Debian**](https://hub.subspace.services/books/software/page/what-is-linux "What is Linux?")

This community-maintained Linux operating system is used to power many corporate machines.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Group\_work</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Docker**](https://hub.subspace.services/books/software/page/what-is-docker "What is Docker?")

This open-source software can quickly setup secure "containers" – or applications running within their own isolated "virtual operating system".

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Group\_work</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Portainer**](https://hub.subspace.services/books/portainer "Portainer")

This community-supported application makes it easy to create and destroy Docker containers from your web browser through an intuitive graphical interface.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Group\_work</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**nginx**](https://hub.subspace.services/books/nginx "nginx")

This open-source software is a web server that powers a large portion of the modern Internet and offers tools for securely connecting self-hosted applications to the World Wide Web for access remotely.

</td></tr></tbody></table>

Once the foundation has been laid, there are a wide gamut of open-source applications that can be self-hosted on your server. These provide services ranging from cloud office suites to personal media management. We dedicate a book to each unique service, providing a more in-depth examination of the project, it's purpose and how to install it.

## Outcome

You will be create a personal home server using available hardware – such as a Raspberry Pi single-board computer or a refurbished desktop computer. This will host a basic website that is available at a domain name that you own.

Installation will require physical access to a monitor and keyboard, but the server will be setup for remote desktop and command line access. This can be available only through your home network or using a browser-based web application to access them while away from home.

[![image.png](https://hub.subspace.services/uploads/images/gallery/2025-03/scaled-1680-/KLeimage.png)](https://hub.subspace.services/uploads/images/gallery/2025-03/KLeimage.png)

Many self-hosted services offer modern, responsive applications that you control through your browser or platform-specific software. [Organizr](https://hub.subspace.services/books/organizr "Organizr") enables you to create a personalized homepage to keeps your services in one place – on desktop and mobile.

# Understanding The Requirements

When deciding on what hardware you need for your server, you need to know what you're going to use it for.

# Ourselves

When we approach technology projects – either as an individual or part of a larger community – there are many things we need to take into account. There is one domain that has the potential to be overlooked in the grand scheme of things, but it is perhaps the most foundational essence of creation:

**Who am I and how do I relate?**

Our individuality makes it mark through our communities – friends, family, neighbors. How we envision ourselves within technology informs how we will approach not only the problem at hand, but the ways we navigate ourselves. We cannot build equitable systems by ourselves through nothing but isolation and grit.

By grounding ourselves within this time and space, we can build relationships outside of ourselves. Our continued growth – and our shifting place with our community – depends on the moments we take to reflect. We connect ourselves to something greater.

> Do you already know that your existence — *who and how you are* — is in and of itself a contribution to the people and place around you? Not after or because you do some particular thing, but simply the miracle of your life. And that the people around you, and the place(s), have contributions as well? Do you understand that your quality of life and your survival are tied to how authentic and generous the connections are between you and the people and place you live with and in?
> 
> — adrienne maree brown

## Who Am I?

- Objective: In this assignment, learners will  
      
    Create a summary document appraising the skills and values they bring to teaching  
    Identify potential barriers to becoming a successful instructor  
    Analyze their positionality in relation to teaching in an information setting  
    Reflection is a very useful learning process, though it is also one of the most difficult. For many of us, it feels like there simply isn't time to step back and think--about some incident at the workplace, where we want to be instead of where we are, how we got here, what steps we should take next. Chances are, you could make time, but you're not prioritizing it: reflection means not only looking at things that went well, but also things that perhaps could have gone differently and that can be very uncomfortable.  
      
    Well, welcome to the discomfort zone: you're going to be reflecting this quarter. Ultimately, the question you're going to be reflecting on is "who do I want to be as a teacher?" but we're going to take it in stages.
- <span style="color: rgb(0, 0, 0);"><span style="font-family: Lato; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; display: inline !important; float: none;">What</span><span style="font-family: Lato; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; display: inline !important; float: none;"> you bring also includes looking at your </span>[positionality](https://www.dictionary.com/e/gender-sexuality/positionality/)<span style="font-family: Lato; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; display: inline !important; float: none;">: how do various aspects of your identity influence how you see, and as a teacher, how you shape your world? There's a good graphic overview of the </span>[concepts of intersectionality, positionality, and privilege here](https://lsa.umich.edu/social-solutions/news-events/news/inside-the-center/insights-and-solutions/infographics/intersectionality--positionality--and-privelege.html)<span style="font-family: Lato; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; display: inline !important; float: none;">. </span></span>
- You'll no doubt come up with some pinch points/barriers in your reflection, as well: what's keeping you from being who you want to be as a teacher? That could range from lack of opportunity to a list of specific skills you want to learn, to a more vague feeling of dread when you think about talking to a group of people. Identifying those challenges is important, as those challenges can become opportunities to learn, grow, and move forward.
- What you bring to teaching/instruction planning--skills, values, hopes  
    What is your positionality in terms of teaching? What parts of your identity influence your work?  
    Perceived obstacles to who you want to be as a teacher--and what opportunities you want to see in this course that can help remove those barriers
- Technology can feel exclusionary
- Personal skills
- We learn that factors beyond our control determine the quality of our lives—something as random as which skin, gender, sexuality, ability, nation, or belief system we are born into sets a path for survival and quality of life.
- there's no "right" answer here, as you each bring something different to this endeavor, and have varying goals.
- We learn to be quiet, polite, indirect, and submissive, not to disturb the status quo.
- In the United States specifically, though I see this most places I travel, we learn that we only have value if we can produce—only then do we earn food, home, health care, education.
- Who are you? Have you asked yourself recently? What is it that you do? Who do you do it for? What drives you?
- Curiosity
- intentional
- adaptation: a change in a plant or animal that makes it better able to live ina particular place or situation; the process of changing to fit some purpose or situation: the process of adapting intention: the thing that you plan to do or achieve: an aim or purpose
- Radical optimism
- Can you appreciate yourself, so that you can appreciate others and their own complex relationship with reality.
- Do you know where you are in your journey and have you taken time to appreciate the journey? Before you can see and appreciate someone else's progress, you must first acknowledge that you yourself have changed and embrace it.

## What Am I Doing?

- 
- Winner, L. (2004). “Technologies as forms of life.” In Kaplan, D M. (Ed.) *Readings in the Philosophy of Technology*. Rowman &amp; Littlefield, pp. 103-113. [Winner - Technologies as forms of life.pdf](https://canvas.uw.edu/courses/1783540/files/128419752?wrap=1 "Winner - Technologies as forms of life.pdf")
- 
- Running a server can take a wide array of technical and design skills, but it can also take curiousity and a compassion.
- We are each capable of so many things when given the time and space to work through understanding our relationship with something new. Something might seem scary until you try it out and realize the similarities to something you're already doing or already know.
- Thinking skills
- Critical thinking
- Logical thinking : if this then that. These are the core fundamentals of the way computers think.
- Basic understanding of how to use a computer and ideally install software.
- Know how to install a computer networking device, such as plug in a computer to a router.
- For any server hardware modifications, you might need to be able to change a graphics card or install a hard drive.
- Troubleshooting problems : how to systematically work through a problem to know which avenues you can explore to attempt a fix. If the Internet isn't working, is it on just one computer or is it every device? Are your neighbors Internet out?
- Modular thinking
- Systems thinking
- Designer
- Developer
- Administrator
- Steward
- Custodian
- What is the difference between a designer and developer? A developer works on the foundations that create something while designers look into the ways these foundations work as part of a system. Many people perform both roles, often without even realizing it. Baking vs decorating a cake.

## How Do I Navigate?

- [<span style="text-size-adjust: auto; box-sizing: border-box;">SAMHSA’s Concept of Trauma and Guidance for a Trauma-Informed Approach </span>](https://store.samhsa.gov/sites/default/files/d7/priv/sma14-4884.pdf)<span style="text-size-adjust: auto; box-sizing: border-box;">(2014) (p. 10-11 “Six Key Principles of a Trauma-Informed Approach”)</span>
- Tuck, E., &amp; Yang, K. W. (2012). Decolonization is not a metaphor. *Decolonization: Indigeneity, Education &amp; Society*, (1), Article 1. [https://jps.library.utoronto.ca/index.php/des/article/view/18630](https://jps.library.utoronto.ca/index.php/des/article/view/18630)
- Arellano Douglas, Veronica. (2020). ["Moving from Critical Assessment to Assessment as Care."](https://pdxscholar.library.pdx.edu/comminfolit/vol14/iss1/4) *Communications in Information Literacy*, 14 (1), 46-65. [UW Catalog](https://orbiscascade-washington.primo.exlibrisgroup.com/discovery/fulldisplay?docid=cdi_doaj_primary_oai_doaj_org_article_88a9c230370e4623bf96d74a1bb330ea&context=PC&vid=01ALLIANCE_UW:UW&lang=en&search_scope=UW_EVERYTHING&adaptor=Primo%20Central&tab=UW_default&query=any,contains,Moving%20from%20Critical%20Assessment%20to%20Assessment%20as%20Care)
- 
- Less on point. More on purpose.
- How do I handle change, especially emergent change?
- We learn to disrespect Indigenous and direct ties to land.
- What you pay attention to grows. emergent strategy
- We learn to compete with each other in a scarcity-based economy that denies and destroys the abundant world we actually live in.
- We learn to deny our longings and our skills, and to do work that occupies our hours without inspiring our greatness.
- Perhaps the most egregious thing we are taught is that we should just be really good at what’s already possible, to leave the impossible alone.
- Growth mindset. We will make mistakes but that is how we learn.
- Transformation doesn’t happen in a linear way, at least not one we can always track. It happens in cycles, convergences, explosions. If we release the framework of failure, we can realize that we are in iterative cycles, and we can keep asking ourselves—how do I learn from this?
- A fractal is a never-ending pattern. Fractals are infinitely complex patterns that are self-similar across different scales. They are created by repeating a simple process over and over in an ongoing feedback loop. Emergent strategy
- Never a failure, always a lesson.\*° emergency strategy
- Change is constant. (Be like water). Emergent strategy
- It's okay to try again from scratch
- Assessing your limits and knowing when to step away. this may be frustrating and you may be discouraged, but we can always approach again later
- We learn as children to swallow our tears and any other inconvenient emotions, and as adults that translates into working through red flags, value differences, pain, and exhaustion.
- We learn that tests and deadlines are the reasons to take action. This puts those with good short-term memories and a positive response to pressure in leadership positions, leading to urgency-based thinking, regardless of the circumstance.
- We learn that the natural world is to be manicured, controlled, or pillaged to support our consumerist lives. Even the natural lives of our bodies get medicated, pathologized, shaved or improved upon with cosmetic adjustments.
- Do you let yourself be yourself, or is that something just below the mask you share with the world?

## How Do I Communicate?

- It troubleshooting for users
- Communicating needs
- Transparency and accountability
- Ant societies function through individual ants acting collectively in accord with simple, local information to carry on all of their survival activities. Every ant relies on the work of others in producing their own work. Cooperative work. Collective. Sustainability. Emergent strategy
- Decentralization: the dispersion or distribution of functions or powers, the delegation of power.
- Interdependence is mutual dependence between things. If you study biology, you'll discover that there is a great deal of interdependence between plants and animals. “Inter-” means “between,” so interdependence is dependence between things, the quality or condition of being interdependent, or mutually reliant, on each other.
- Starlings. The synchronized movement patterns of a starling flock is also known as a murmuration. Guided by simple rules, starling murmurations can react to their environment as a group without a central leader orchestrating their choices; in any instant, any part of the flock can transform the movement of the whole flock. Collective leadership/partnership. Adaptability.
- Similarly, we learn our organizations are only as successful as our fundraising results, whether the community impact is powerful or not.
- We learn to bond through gossip, venting, and destroying, rather than cultivating solutions together.
- We learn to manipulate each other and sell things to each other, rather than learning to collaborate and evolve together.
- How to design an information query
- Getting support on a forum or within a community
- How to ask questions
- There is a conversation in the room that only these people at this moment can have.\*® Find it. Emergent strategy
- Trust the People. (If you trust the people, they become trustworthy) .\* Emergent stategy
- This is a space where everyone deserves to have their voices and needs heard. Open source software is intended to get a democratic space
- Your choices affect your community and your ecosystem
- Empathy
- Healing
- Building trust
- Ask for and receive what you need
- Love may seem silly. But it is the root of compassion and care. It leads to passion for what we do and strive to support those we care for. While this is leveraged in the creation of technology, it is
- Move at the speed of trust. Focus on critical connections more than critical mass—build the resilience by building the relationships. Emergent strategy

# Computer

What you're planning on doing with your server will dictate the hardware you'll need to fulfill those requirements.

<table border="1" class="align-center" id="bkmrk-" style="border-collapse: collapse; width: 100%; border-width: 0px;"><colgroup><col style="width: 49.881%;"></col><col style="width: 49.881%;"></col></colgroup><tbody><tr><td style="border-width: 0px;">[![1000000274.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000274.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000274.jpg)

Raspberry Pi 4

</td><td style="border-width: 0px;">[![1000006101.jpg](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006101.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-02/1000006101.jpg)Desktop Computer</td></tr></tbody></table>

When you're running one or two services, a Raspberry Pi would probably suffice, while running your own personal cloud services may require a refurbished desktop computer.

Running a media server may require a faster processor, a decent graphics card and adequate storage space for digital media. We provide "Quick-Start" examples to help you make up your mind.

[<button class="nav-button" type="button">Quick-Start Examples</button>](https://hub.subspace.services/books/hardware/chapter/quick-start-examples "Quick-Start Examples")

## Core Processor

Choosing the type of main processor you will use for your server is a core decision to building a server.

[![1000001468.png](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001468.png)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001468.png)

There are two primary families of processors designed and developed to meet specific criteria:

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><tbody><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Desktop\_windows</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**x86 Processor**

Traditional computers – such as desktops, laptops and servers – use an evolution of the same processors first developed in the 1970s. These x86 processors are named after the [Intel 8086](https://en.m.wikipedia.org/wiki/Intel_8086) that the architecture is based on.

[![1000006807.jpg](https://hub.subspace.services/uploads/images/gallery/2025-03/scaled-1680-/1000006807.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-03/1000006807.jpg)

Traditional x86 processors utilize a [Complex Instruction Set](https://en.m.wikipedia.org/wiki/Complex_instruction_set_computer) that is more equipped to juggle multiple tasks. They focus on sustained processing power and can handle a larger workload. Traditional computers come with active heat management – such as fans or liquid cooling.

These types of computers are great for hosting your own personal cloud with a variety of services, such as [OwnCloud](https://hub.subspace.services/books/owncloud "OwnCloud"), [Jellyfin](https://hub.subspace.services/books/jellyfin "Jellyfin"), [qBittorrent](https://hub.subspace.services/books/qbittorrent "qBittorrent"), or [media procurement](https://hub.subspace.services/books/quick-bundles/page/media-managers "Media Procurement") services.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Mobile</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**ARM Processor**

[ARM](https://en.wikipedia.org/wiki/ARM_architecture_family) (Advanced RISC Machine) is a new class of processors that are in the same family as the one that power your cellphone.

[![1000000265.webp](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000265.webp)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000265.webp)

The [Raspberry Pi](https://hub.subspace.services/raspberrypi.com) – and other single-board computers – use this type of processor for their power efficiency. On the flip side, they can't juggle running multiple programs like an x86 processor. Without adding fans to cool them, these [system-on-a-chip](https://en.m.wikipedia.org/wiki/System_on_a_chip) are susceptible to overheating.

These extremely cost-effective systems are great hosting a single service – such as a [personal website](https://hub.subspace.services/books/nginx "Personal Websites"), [BitWarden](https://hub.subspace.services/books/vaultwarden "BitWarden"), [Home Assistant](https://hub.subspace.services/books/home-assistant "Home Assistant") or [Grocy](https://hub.subspace.services/books/grocy "Grocy").

</td></tr></tbody></table>

<table border="1" class="align-center" id="bkmrk-recommended-specs-ac" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><thead><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">  
</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Recommended Specs**

</td></tr></thead><tbody><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Acute</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Released**

2011 or newer

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">speed</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Speed**

1.8GHz or higher

</td></tr></tbody></table>

## Graphics Processor   


When it comes operating a server, graphics cards can be leveraged by certain applications. Compared to computational processors, graphics cards have the ability to run many processes in parallel. This is a great advantage for image and video processing, as well as data analysis and number cruching.

Within modern computer systems, there are two classes of graphics processors.

<table border="1" class="align-center" id="bkmrk-memory-integrated-gr" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><tbody><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Memory</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Integrated Graphics**

Many modern processors come with graphics cards directly embedded into the processor. This provide enough power for basic operations – such as running a web browser or basic image editor.

Integrated graphics cards share hardware resources with the processor decreasing their overall power. They may not be robust enough for complex image or video processing tasks.

[![1000001481.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001481.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001481.jpg)

Modern desktop systems can be modified to add more graphical processing power. Most single-board computers – like the Raspberry Pi – cannot be modified to increase their graphic processing.

[![1000000265.webp](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000265.webp)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000265.webp)

While Raspberry Pi computers are useful for small computational tasks, they can often lack the graphical processing necessary to do complex image processing tasks. These computers do not dedicated graphics processors and instead rely on a "system-on-a-chip" that shares graphical and computational power.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Developer\_board</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Dedicated Graphics**

Traditional computers have a powerful advantage here because they are so customizable. Thanks to the extensible [PCI-e interface](https://en.wikipedia.org/wiki/PCI_Express), additional graphics processor – or a graphics cards – with much more dedicated power can be installed.

[![1000006094.jpg](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006094.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-02/1000006094.jpg)

Dedicated graphics cards have specialized cores that allow them to convert videos more efficiently than a CPU. In addition, they come with their own memory to lessen the strain on the rest of the computer system's hardware.

[![1000001487.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001487.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001487.jpg)

These can be helpful for tasks that deal with images and videos – such as [Jellyfin](https://hub.subspace.services/books/jellyfin "Jellyfin •") processing a movie for streaming through a media server.

</td></tr></tbody></table>

<table border="1" class="align-center" id="bkmrk-settings_phone-dsl-o" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><thead><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">  
</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Recommended Specs**

</td></tr></thead><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Acute</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px; width: 562px;">**Released**

2016 or newer

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Speed</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Processor Speed**

1.0GHz or higher

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Memory</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Memory Capacity**

4GB or higher

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Developer\_board</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Expansion Interface**

PCI-e 3.0 or newer

</td></tr></tbody></table>

## Memory   


The amount and speed of [Random Access Memory](https://en.m.wikipedia.org/wiki/Random-access_memory) – or RAM – can affect the responsiveness of your server. Your server will need more memory when it needs to juggle multiple services at once.

<table border="1" class="align-center" id="bkmrk-settings_phone-dsl-o-1" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Memory</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px; width: 562px;">**Integrated Memory**

Single-board computers have memory that is built directly into the hardware board and cannot be upgraded after the initial purchase.

<table border="1" class="align-center" style="border-collapse: collapse; width: 99.9899%; border-width: 1px;"><colgroup><col style="width: 100%;"></col></colgroup><tbody><tr><td>[![1000000265.webp](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000265.webp)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000265.webp)</td></tr></tbody></table>

They often use a "low-powered" variant of memory called [LPDDR](https://en.wikipedia.org/wiki/LPDDR) that can decrease its overall speed and responsiveness during multitasking.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Developer\_board</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Extensible Memory**

Traditional computers use the [DDR](https://en.wikipedia.org/wiki/DDR_SDRAM) class of RAM that has been [progressively updated since the 1990s](https://en.m.wikipedia.org/wiki/DDR_SDRAM) – currently up to [DDR5](https://en.m.wikipedia.org/wiki/DDR5_SDRAM). Each successor is not backwards compatible, but provides sizable advancements over previous iterations. With these systems, memory can be upgraded by purchasing RAM modules of the same type and speed.

<table border="1" id="bkmrk--12" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000006093.jpg](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006093.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-02/1000006093.jpg)

</td><td>[![1000000266.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000266.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000266.jpg)

</td></tr></tbody></table>

</td></tr></tbody></table>

<table border="1" class="align-center" id="bkmrk-recommended-specs-me" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><thead><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">  
</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Recommended Specs**

</td></tr></thead><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Memory</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px; width: 562px;">**Capacity**

8GB or higher

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Category</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Type**

DDR4 or newer

</td></tr></tbody></table>

## Storage

There are three types of storage hardware that are employed to fulfill server needs:

<table border="1" class="align-center" id="bkmrk-hard_drive-platter-d" style="border-collapse: collapse; border-width: 0px; height: 261.6px; border-spacing: 5px;"><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Hard\_drive</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px; width: 562px;">**Platter Disks**

These are based on an older, well-tested technology originating in the 1950s. Modern hard disk drives commonly use the [SATA](https://en.wikipedia.org/wiki/SATA) protocol.

<table border="1" class="align-center" id="bkmrk-platter-hard-disk-dr" style="border-collapse: collapse; width: 99.9899%; border-width: 0px;"><colgroup><col style="width: 50.1511%;"></col><col style="width: 50.1511%;"></col></colgroup><tbody><tr><td style="border-width: 0px;">[![1000006088.jpg](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006088.jpg)Platter Hard Disk Drive](https://en.m.wikipedia.org/wiki/Hard_disk_drive_platter)</td><td style="border-width: 0px;">[![ports-SATA-motherboard.webp](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/ports-sata-motherboard.webp)](https://hub.subspace.services/uploads/images/gallery/2025-04/ports-sata-motherboard.webp)

[SATA Port](https://en.m.wikipedia.org/wiki/SATA)

</td></tr></tbody></table>

They are slower, but can hold up to 20TB of storage on each drive – making them great for longer-term multimedia or document storage.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Hard\_drive</span></td><td class="align-left" style="border-width: 0px; padding: 5px; width: 562px;">**Solid State Disks**

These use the newer solid state memory standard popularized by the smart phones. SSDs are incredibly fast, but spacr comes at a premium.

<table border="1" class="align-center" style="border-collapse: collapse; width: 99.9899%; border-width: 1px;"><colgroup><col style="width: 100%;"></col></colgroup><tbody><tr><td>[![1000001484.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001484.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001484.jpg)

SATA Solid State Drive

</td></tr></tbody></table>

These drives can use the SATA protocol like traditional hard drives, but they are increasingly available using an M.2 port. These "[Non-Volatile Memory express](https://en.wikipedia.org/wiki/NVM_Express)" – or NVMe drives – transport data over the speedy PCIe interface.

<table border="1" id="bkmrk-nvme-solid-state-dri" style="border-collapse: collapse; width: 99.9899%; border-width: 0px;"><colgroup><col style="width: 50.1511%;"></col><col style="width: 50.1511%;"></col></colgroup><tbody><tr><td style="border-width: 0px;">[![1000006092.jpg](https://hub.subspace.services/uploads/images/gallery/2025-02/scaled-1680-/1000006092.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-02/1000006092.jpg)[NVMe Solid State Drive](https://en.m.wikipedia.org/wiki/Solid-state_drive)</td><td style="border-width: 0px;">[![m2mkey.jpg](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/m2mkey.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-04/m2mkey.jpg)

[M.2 Port](https://en.m.wikipedia.org/wiki/M.2)

</td></tr></tbody></table>

Solid state drives, especially NVMe drives, are the best option for storing the operating system and other configuration files. When hosting a media server – such as [Jellyfin](https://hub.subspace.services/books/jellyfin "Jellyfin •"), [Audiobookshelf](https://hub.subspace.services/books/audiobookshelf "Audiobookshelf •") or [Kavita](https://hub.subspace.services/books/kavita "Kavita •") – storing databases, metadata, and other cache files on an SSD can greatly improve the media server's responsiveness.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Hard\_drive</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Flash Disks**

When using a Single-Board computer – such as the Raspberry Pi – the primary operating system is typically stored on a MicroSD flashcard.

<table border="1" id="bkmrk--18" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000000267.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000267.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000267.jpg)</td><td class="align-left">[![1000000268.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000268.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000268.jpg)</td></tr></tbody></table>

These use classification systems to gauge their overall speed and performance. These are signified by symbols on the SD card and it's packaging. They are used to ensure performance with certain devices – like cameras or cell phones.

Two common certification are:

<table border="1" id="bkmrk--19" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000000270.png](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000270.png)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000270.png)

Speed Class

</td><td>[![1000000271.png](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000271.png)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000271.png)

UHS Speed Class

</td></tr></tbody></table>

For the best performance, Raspberry Pi recommends a Speed Class of C10 – or a UHS Speed Class of U1. These provide a guaranteed transfer speed of 10MB/second.

</td></tr></tbody></table>

Graph/table of different speeds SD, HDD, SSD, nvme, ram

<table border="1" class="align-center" id="bkmrk-type-read-speed-writ" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 24.9337%;"></col><col style="width: 24.9337%;"></col><col style="width: 24.9337%;"></col><col style="width: 24.9337%;"></col></colgroup><thead><tr><td>Type</td><td>Read Speed</td><td>Write Speed</td><td>Capacity</td></tr></thead><tbody><tr><td>MicroSD C1</td><td>10 — 100 MB/s</td><td>10 — 100 MB/s</td><td>16GB — 1TB</td></tr><tr><td>MicroSD U1</td><td>10 — 100 MB/s </td><td>10 — 100 MB/s </td><td>16GB — 1TB</td></tr><tr><td>SATA HDD</td><td>80 — 160 MB/s</td><td>80 — 160 MB/s</td><td>250GB — 32TB</td></tr><tr><td>SATA SSD</td><td>200 — 600 MB/s</td><td>200 – 600 MB/s</td><td>250GB — 20TB</td></tr><tr><td>NVMe SSD</td><td>5000 MB/s</td><td>6000 MB/s</td><td>120GB — 4TB</td></tr><tr><td>RAM</td><td>40 GB/s</td><td>40 GB/s</td><td>4GB — 512GB</td></tr></tbody></table>

Depending on the form factor, there is a variability in both the types and quantity of storage connectors. Compact PCs often support one or two drives, while a full computer case can often accommodate more.

[![1000000275.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000275.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000275.jpg)

Each of these storage drive technologies are also available to be used as an external disk over a [USB](https://en.wikipedia.org/wiki/USB), [Thunderbolt](https://en.m.wikipedia.org/wiki/Thunderbolt_(interface)) or [eSata](https://en.m.wikipedia.org/wiki/SATA#eSATA) connection. This expands storage options beyond what will fit inside of the computer case. However, external drives can create a "[bottleneck](https://en.m.wikipedia.org/wiki/Bottleneck_(engineering))" where speed and efficiency become limited, so they should not be used for system files.

When hosting multiple services from a single server – such as a personal Jellyfin media server and a public WordPress site – it can be advantageous to store each of their files on seperate storage drives. This has security benefits, as well as balances the load across multiple drives to avoid a [bottleneck](https://en.m.wikipedia.org/wiki/Bottleneck_(engineering)).

Similarly, storing sporadically accessed files – like your multimedia – on traditional platter drives allows them to conserve power by turning off hard disks that haven't been used recently.

<table border="1" class="align-center" id="bkmrk-settings_phone-dsl-o-2" style="border-collapse: collapse; border-width: 0px; border-spacing: 5px;"><thead><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">  
</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**Recommended Specs**

</td></tr></thead><tbody><tr><td class="align-center" style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Terminal</span></td><td class="align-left" style="border-width: 0px; padding: 5px; width: 562px;">**Operating System**

SSD 150GB or greater, NVMe or SATA

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Manufacturing</span></td><td style="border-width: 0px; padding: 5px; width: 562px; height: 43.6px;">**Service Files**

SSD 150GB or greater, NVMe or SATA

</td></tr><tr style="height: 43.6px;"><td style="border-width: 0px; padding: 5px; width: 38px; height: 43.6px;"><span class="material-symbols-outlined">Subscriptions</span></td><td style="border-width: 0px; padding: 5px; width: 562px; height: 43.6px;">**Multimedia &amp; Documents**

HDD 2TB or greater, SATA

</td></tr></tbody></table>

## Connectivity

A network-connected server should be connected to your router with a hard-wired Cat6 Ethernet cable.

<table border="1" class="align-center" id="bkmrk-settings_phone-dsl-o-3" style="border-collapse: collapse; border-width: 0px; height: 130.8px; border-spacing: 5px;"><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Settings\_ethernet</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px; width: 562px;">**Wired Connection**

Your [Network Interface](https://en.m.wikipedia.org/wiki/Network_interface_controller) should have a 1Gbit or preferably 2.5Gbit connection speed. This is the throughput available within your Local Area Network and is separate from your ISP speed.

<table border="1" class="align-center" style="border-collapse: collapse; width: 99.9899%; border-width: 1px;"><colgroup><col style="width: 100%;"></col></colgroup><tbody><tr><td>[![1000001488.jpg](https://hub.subspace.services/uploads/images/gallery/2025-08/scaled-1680-/1000001488.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-08/1000001488.jpg)</td></tr></tbody></table>

Ethernet cables use a classification system to ensure speed and reliability over certain distances – such as Cat5, Cat6 or Cat8. When possible, using Cat6 Ethernet cables will provide reliable performance over short distances.

<table border="1" id="bkmrk--22" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000000278.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000278.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000278.jpg)</td><td>[![1000000279.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000279.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000279.jpg)</td></tr></tbody></table>

</td></tr><tr style="height: 43.6px;"><td style="border-width: 0px; padding: 5px; width: 38px; height: 43.6px;"><span class="material-symbols-outlined">Wifi</span></td><td style="border-width: 0px; padding: 5px; width: 562px; height: 43.6px;">**Wireless Connection**

Wi-Fi should be avoided while running a server where reliability is crucial. When not in use, disabling the wireless card improves security by decreases unintended means of access.

</td></tr><tr style="height: 43.6px;"><td style="border-width: 0px; padding: 5px; width: 38px; height: 43.6px;"><span class="material-symbols-outlined">Bluetooth</span></td><td style="border-width: 0px; padding: 5px; width: 562px; height: 43.6px;">**BlueTooth**

This can be used to connect smart devices to [Home Assistant](https://hub.subspace.services/books/home-assistant "Home Assistant •"), but is not crucial for any server functions. When not in use, it should be completely disabled because [BlueTooth hacking](https://www.techtarget.com/searchmobilecomputing/definition/bluesnarfing) is a [common avenue](https://www.ltts.com/sites/default/files/resources/pdf/whitepapers/2017-12/Bluetooth-Hacking-and-its-Prevention.pdf) for exploitation when left on.

</td></tr><tr><td style="border-width: 0px; padding: 5px; width: 38px;"><span class="material-symbols-outlined">Usb</span></td><td style="border-width: 0px; padding: 5px; width: 562px;">**External Wired Connections**

There are many protocols and connectors that can be used to attach additional peripherals – like USB, eSATA, Thunderbolt, USB 3.0, and FireWire.

These can be used to attach hardware peripherals to a computer through a physical, wired connection. Ranging from hard drive storage to a ZigBee adapter for smart home devices, external connectors are how you can expand your server outside of its case.

</td></tr></tbody></table>

# Power

Operating a server requires electricity to power all of the running parts – from the server itself to the electronics that maintain your Internet connection or attach external storage disks. By choosing to self-host, we not only retain [digital autonomy](https://en.m.wikipedia.org/wiki/Digital_self-determination) but can consider our effect on the ecosystems around us.

When paying your power bill, [wattage](https://en.m.wikipedia.org/wiki/Electric_power) is how we quantify how much energy is being used per second. The power draw of a device is measured over time – typically expressed as [kilowatt-hours](https://en.m.wikipedia.org/wiki/Kilowatt-hour) or kWh. Utility companies offer consistent access to power by the kilo-watt hour, generated from both [renewable](https://en.m.wikipedia.org/wiki/Renewable_energy) and [consumable fossil fuels](https://en.m.wikipedia.org/wiki/Fossil_fuel).

<p class="callout info">Energy can comes from many sources and [some are harmful](https://en.m.wikipedia.org/w/index.php?title=Environmental_impact_of_the_energy_industry). Learn more about [where your energy comes from](https://app.electricitymaps.com/map/72h/hourly).</p>

Home electronics are made to work with standard power outlets and do not require much conscious planning – plug a device in and it just works. Despite this, electronics must have information about their power requirements right on them. This can help estimate how much an always-on computer costs to operate per payment cycle.

### Power Consumption 

[Power Supply Units](https://en.m.wikipedia.org/wiki/Power_supply_unit_(computer)) – or PSUs – provide electricity to individual components within a computer. These specify the wattage that the power supply can draw during a heavy work load. This is only maximum possible power draw and isn't an indication of how much power the computer will consume while idle.

[![1000000324.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000324.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000324.jpg)

Each component connected to the PSU will need to draw power in order to function and every computer has different parts. The exact amount fluctuates based on their workload and the function being performed – converting a video requires more power than inputting text into a text editor. An operating system manages power, putting idle parts to sleep – or a low-power mode that conserves electricity.

<p class="callout warning">Servers can draw a lot of power at once and should be plugged directly into a wall socket, not a power strip or extension cable.</p>

CPUs and GPUs generally require the most power, but parts designed for mobile devices are extremely efficient. By exploring the average power usage for computer components – both idle and under load –you can estimate how much power the server will consume over the course of a day.

*Power Consumption in Watts*

<table border="1" class="align-center" id="bkmrk-component%C2%A0-idle-unde" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col></colgroup><thead><tr><td>Component   
</td><td>Idle</td><td>Under Load</td></tr></thead><tbody><tr><td>Motherboard</td><td>15</td><td>25 — 100</td></tr><tr><td>Desktop CPU</td><td>10 — 30</td><td>75 – 250</td></tr><tr><td>Desktop GPU</td><td>10 — 50</td><td>200 – 500</td></tr><tr><td>Mobile CPU</td><td>5 — 15

</td><td>15 — 65</td></tr><tr><td>Mobile GPU</td><td>10 — 100</td><td>35 — 150</td></tr><tr><td>Hard Disk Drive</td><td>5</td><td>5 — 15</td></tr><tr><td>Solid State Drive</td><td>1</td><td>1 — 5</td></tr><tr><td>RAM module</td><td>2</td><td>2 – 5</td></tr></tbody></table>

These numbers are the instantaneous power usage by the computer – measured in watts. These are a helpful baseline, but power draw will fluctuate. When not actively in use, a modern system might consume around 100W. Office tasks like browing the web or writing an email may require 250W, while a graphic-intensive video game could draw up to 800W.

<p class="callout info">Want a better idea? Try out [pcpartpicker.com](https://pcpartpicker.com/list/) and add your exact components.</p>

When connecting your server to the Internet, the modem and router will also consume electricity. While this may be a lot less than a server, that power still needs to be accounted for. These devices will also draw more power when under a heavy load – such as streaming multiple videos.

Graph comparison of device wattage

*Power Consumption in Watts*

<table border="1" class="align-center" id="bkmrk-device-idle-under-lo" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col><col style="width: 33.4218%;"></col></colgroup><thead><tr><td>Device</td><td>Idle</td><td>Under Load</td></tr></thead><tbody><tr><td>Raspberry Pi 5</td><td>3</td><td>3 — 7</td></tr><tr><td>Laptop</td><td>5</td><td>30 — 200</td></tr><tr><td>Mini PC</td><td>5 — 20</td><td>20 — 400</td></tr><tr><td>Desktop PC</td><td>35 — 100</td><td>150 — 300</td></tr><tr><td>Workstation</td><td>75 — 150</td><td>300 — 800</td></tr><tr><td>Wi-Fi Router</td><td>5</td><td>5 — 20</td></tr><tr><td>Modem</td><td>5</td><td>5 — 20</td></tr></tbody></table>

<p class="callout info">Want to be exact? Try out a digital power meter to find your exact energy usage.</p>

### Cost Estimates

Once we have a better idea how much energy we'll require – in the form of wattage – we can estimate how much power that will consume over the course of an entire day.

<p class="callout info">Don't want to do math? Try out this [wattage calculator from EnergyBot](https://www.energybot.com/tools/energy-usage-calculator.html).</p>

You calculate this by multiplying the total wattage you estimated by the number of hours a day the server will be drawing power. This will be 24 hours per day. We now have our wattage per hour. Finally, we can divide this number by 1000 to achieve our kilowattage per hour.

*E*<sub>(kWh/day)</sub> = *P*<sub>(W)</sub> × *t*<sub>(h/day)</sub> / 1000<sub>(W/kW)</sub>

<p class="callout info">A 200 watt Mini PC will use 4.8 kWh per day – or 144 kWh per month – when left running all day, every day.</p>

Knowing the kilowatt hours consumed by the server, you can estimate the monetary cost per day. Your utility provider will list the exact unit price per kW/h on your account summary or service bill.

The cost of energy varies widely across the country – depending on a host of factors – and ranges all the way from $0.10 to $0.43 per killowat-hour. Energy rates for homes and residences are often higher than prices for businesses due to the economy of scale.

[![1000000322.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000322.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000322.jpg)

With this information, it's simple to calculate a monetary cost. By multiplying the cost per kilowatt by the quantity of kilowatts, we arrive at the final cost. When estimating per month, we can see how much our server affects our monthly bill.

<p class="callout info">Energy costs $0.12 per kWh in Washington State and a 200 watt computer uses 144 kWh over 30 days. This means that it costs $17.28 per month to run an always-on server.</p>

# Internet

You will need internet access for your home server and the devices connecting to it. Your [Internet Service Provider](https://en.m.wikipedia.org/wiki/Internet_service_provider) (ISP) is the primary factor leading to the quality and stability of your server connection.

## Connection

Outside of your hardware, your internet connection dictates how many people can access your server as well as their connection quality, stability and uptime. There are many different consumer options for connecting your home to the World Wide Web.

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">stylus\_laser\_pointeR</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[Fiber](https://en.m.wikipedia.org/wiki/Fiber-optic_communication)**

One of the fastest connections available, this uses flashing light to transmit data over long distances.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Cable</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**[Cable](https://en.m.wikipedia.org/wiki/Cable_Internet_access)**

Fast and cost-effective, this connection uses television infrastructure to transmit data to an internet provider.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">satellite\_alt</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Satellite**](https://en.m.wikipedia.org/wiki/Satellite_Internet_access)

Available even in remote areas, this connection occurs through satellites in orbit around the planet.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Wifi\_tethering</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Wireless Broadband**](https://en.m.wikipedia.org/wiki/Wireless_broadband)

This allows devices to connect to a wireless network broadcast over a large area by an service provider.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">settings\_phone</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**DSL**](https://en.m.wikipedia.org/wiki/Digital_subscriber_line)

One of the first consumer options, this connection uses telephone infrastructure to transmit data.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Signal\_cellular\_alt</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">[**Mobile Broadband**](https://en.m.wikipedia.org/wiki/Mobile_broadband)

Quickly gaining in popularity, this internet option uses wireless cellular data infrastructure to create a local area network for your devices.

</td></tr></tbody></table>

Hardwired internet connection – such as cable or fiber – are preferred because they are more reliable. Wireless connections – like satellite and mobile broadband – can be heavily reliant on other external factors like congestion and weather.

Exact upload and download speed requirements will depends on what services you're hosting, as well as how many people will be accessing them. Hosting a home server serving your immediate family, here is a good starting point:

<table border="1" class="align-center" id="bkmrk-download-download-mi" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Download</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Download**

*Minimum:* 200Mbps

*Recommended:* 1,000Mbps

This will be most important for downloading data from the internet – such as multimedia, metadata and updates. Internet bandwidth will be shared between every internet-connected device in your home, so it's important to have enough to go around.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Upload</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Upload**

*Minimum:* 20Mbps

*Recommended:* 200Mbps

This will primarily be used to share multimedia and files outside of your home – like friends, family on the World Wide Web. Residential internet connections often provide significantly lower upload bandwidth than download under the assumption that you will not be running a personal server.

</td></tr></tbody></table>

Gigabit connection speeds are recommended for hosting media servers, but low-bandwidth websites that don't serve many images or videos may perform acceptably at slower speeds.

Depending on your Internet service provider and connection type, there may be restrictions on how data can be transmitted outside your network.

## Self-Hosting

You are not breaking any laws by self-hosting a server at home. However, not all ISPs expressly permit web hosting from residential internet connections. While a few embrace self-hosting, many others choose not to advertise the feature. Unfortunately, ISPs are increasingly blocking the ability to host a Web server from home.

Each Internet Service Provider has their own rules and regulations about server hosting on residential contracts. Business contracts are more costly, but often explicitly allow web-hosting and provide features explicitly to support it.

Your provider may have additional stipulations regarding the nature of the content you can host. Self-hosting personal services may draw less attention than for-profit commercial storefronts or public discussion forums. Controversial content may be explicitly censored as a result of your Internet Service Provider contract.

<p class="callout danger">Before proceeding, you must understand the terms of your agreement with your internet service provider. </p>

### Restricted Access

If your ISP blocks web server hosting, there are still options to connect while away from home. These vary in cost, complexity and contractual concerns:

<table border="1" class="align-center" id="bkmrk-contract-commercial-" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Contract</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Commercial Contract**

When feasible, purchasing a business plan with your ISP may expressly permit web hosting. This may be available at your current residence and would provide added benefits – such as a static IP address.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Private\_connectivity</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**CloudFlare Tunnel**

[This method](https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/) allows your server to communicate with the [CloudFlare](https://www.cloudflare.com/) service without needing to directly connect it to the World Wide Web. This circumvents the block by channeling web-based traffic through the CloudFlare remote servers first. They explicitly [forbid using this service for transferring multimedia](https://www.cloudflare.com/en-gb/service-specific-terms-application-services/#content-delivery-network-terms).

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Vpn\_lock</span></td><td style="border-width: 0px; padding: 5px;">**Virtual Private Network**

Hosting your own VPN server – or utilizing the one built into your router – will allow your devices to remotely connect to your [Local Area Network](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?"). This means that your devices can interact with your server as if you were at home.

</td></tr></tbody></table>

# Router

You will need a relatively modern router to connect your server to the Internet – through the publicly accessible World Wide Web or a Virtual Private Network to securely connect while away from home.

There are open hardware router options like the [Turris Omnia](https://www.turris.com/en/products/omnia/) and the [OpenWRT One](https://www.aliexpress.us/item/3256807609464530.html?gatewayAdapt=glo2usa4itemAdapt), but they can be expensive or require construction. Consumer routers may work with open firmware like [OpenWRT](https://openwrt.org/) and [FreshTomato](https://www.freshtomato.org/), but the installation process can be tedious – especially with no prior experience.

<table border="1" class="align-center" id="bkmrk-" style="border-collapse: collapse; width: 100%; border-width: 1px;"><colgroup><col style="width: 50.1326%;"></col><col style="width: 50.1326%;"></col></colgroup><tbody><tr><td>[![1000006831.jpg](https://hub.subspace.services/uploads/images/gallery/2025-03/scaled-1680-/1000006831.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-03/1000006831.jpg)</td><td>[![1000006832.jpg](https://hub.subspace.services/uploads/images/gallery/2025-03/scaled-1680-/1000006832.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-03/1000006832.jpg)</td></tr></tbody></table>

Thankfully, most modern routers will fulfill the requirements to host your own home server. Mainstream manufacturers – such as [TP-Link](https://www.tp-link.com/us/), [Netgear](https://www.netgear.com/), and [ASUS](https://www.asus.com/) – offer routers that cover the gamut between performance and price.

<p class="callout success">When using a mesh router, connecting your server to the hub closest to the modem will provide the best performance.   
</p>

When investigating a router that can be used to host a personal server, these are the features required:

<table border="1" class="align-center" id="bkmrk-download-download-mi" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Alt\_route</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Port Forwarding**

You will need a router that supports [Port Forwarding](https://en.m.wikipedia.org/wiki/Port_forwarding) to allow traffic from outside the internet to be routed to your server within your Local Area Network.

[![1000000281.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000281.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000281.jpg)

[![1000000283.jpg](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000283.jpg)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000283.jpg)

[![1000000282.png](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000282.png)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000282.png)

  
Routers provided by your Internet Service Provider – especially leased or rented equipment – do not always support forwarding port 80 and 443. This is to discourage self-hosting a web server from home. These ports are required for hosting an accessible web server.

While it is not illegal to host a server from home, your Internet Service Provider may restrict self-hosting a web server through a residential connection contract. You may be able to circumvent this by using an aftermarket router, but it may be considered a breach of contract.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Diamond\_shine</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Quality of Service**

QoS ([Quality of Service](https://en.m.wikipedia.org/wiki/Quality_of_service)) enables you to give bandwidth priority to your server and other computer. Many consumer routers allow you to set the theoretical bandwidth provided by your Internet Service Provider and leverage that information to ensure that specific network devices have a minimum Internet bandwidth.

[![1000000280.png](https://hub.subspace.services/uploads/images/gallery/2025-05/scaled-1680-/1000000280.png)](https://hub.subspace.services/uploads/images/gallery/2025-05/1000000280.png)

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Vpn\_lock</span></td><td class="align-left" style="border-width: 0px; padding: 5px;">**Virtual Private Network**

The option to configure your router as both a VPN Server and VPN Client is becoming more common. A Virtual Private Network allows devices and networks to securely connect to each other over the open internet.

<div drawio-diagram="1075"><img src="https://hub.subspace.services/uploads/images/drawio/2025-05/drawing-3-1746068748.png" alt=""/></div>

When acting as a server, your router makes it simple to connect to your Local Area Network, even while away from home. This will allow you to access your self-hosted services without making them available to the open Internet.

While acting as a VPN server, you can connect to a VPN service you subscribe to – such as [Proton VPN](https://www.privacyguides.org/en/vpn/#proton-vpn)<span style="white-space: pre-wrap;">, </span>[Mullvad](https://www.privacyguides.org/en/vpn/#mullvad)<span style="white-space: pre-wrap;">, and </span>[IVPN](https://www.privacyguides.org/en/vpn/#ivpn). This will hide all of the traffic on your Local Area Network behind the VPN service.

<p class="callout warning align-left">This can transmit a lot of data through your VPN provider. Make sure your plan has the monthly bandwidth to accommodate every device in your home.   
</p>

<table class="align-left" id="bkmrk--8" style="border-width: 0px;"><colgroup><col style="width: 240px;"></col><col style="width: 240px;"></col><col style="width: 240px;"></col></colgroup><tbody><tr style="height: 10px;"><td>[![1000006921.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006921.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006921.png)

</td><td>[![1000006922.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006922.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006922.png)

</td><td>[![Untitled-1.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/untitled-1.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/untitled-1.png)

</td></tr></tbody></table>

</td></tr><tr><td style="border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Dns</span></td><td style="border-width: 0px; padding: 5px;">**Dynamic DNS**

Many modern routers provide a [Dynamic DNS](https://en.m.wikipedia.org/wiki/Dynamic_DNS) service, such as ASUS, [TP-Link](https://www.tp-link.com/us/support/faq/1367/) and [Netgear](https://kb.netgear.com/1058/What-is-Dynamic-DNS-DDNS). This allows you to connect to your home server as a subdomain of their service instead of buying your own domain.

</td></tr></tbody></table>

# Cables & Accessories

Aside from the primary hardware – such as the server computer and a router to connect it to the Internet – we will also need miscellaneous cables and accessories to get everything setup.

## Display

Our server will be "headless" – meaning we will be able to control it remotely over the network without using a keyboard, mouse or display. However, we will still need a display during the initial installation process or while troubleshooting.

<table border="1" class="align-center" id="bkmrk-stylus_laser_pointer" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Desktop\_windows</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Display**

You will need a compatible display with a resolution greater than 640x480.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Cable</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Cables**

You will need any applicable power cables or adapters. Similarly, we will need a compatible cable for connecting the display to our server.

</td></tr></tbody></table>

## Input Devices

While we will be accessing our server remotely, we need some [human interface devices](https://en.m.wikipedia.org/wiki/Human_interface_device) – such as a mouse and keyboard for controlling the computer.

<table border="1" class="align-center" id="bkmrk-mouse-mouse-you-will" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Mouse</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Mouse**

You will need a compatible USB mouse.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Keyboard</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Keyboard**

You will need a compatible USB keyboard.

</td></tr></tbody></table>

## Networking

We explored the router as an important piece of networking equipment, but there are other components that we will need to host a server.

<table border="1" class="align-center" id="bkmrk-settings_ethernet-mo" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Settings\_ethernet</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Modem**

When you pay for access to an Internet Service Provider, they may lease or sell a modem that provides access to their service. Some ISPs also allow customers to purchase their own modem hardware.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Keyboard</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Cables**

You will need at least two Category 6 Ethernet cables. These can handle blazing fast 2.5Gbit connection speeds over short cables while still maintaining minimum 1GBit speeds over distances of up to 100 meters – or 328 feet.

</td></tr></tbody></table>

## External Storage

Computer systems are equipped with internal storage drives for storing the operating system, as well as your applications, files and media. When setting up and running a server, external storage devices are just as important.

<p class="callout warning">These storage devices will be erased and any important data should be backed up.</p>

<table border="1" class="align-center" id="bkmrk-security_key-flash-d" style="border-collapse: collapse; width: 600px; border-width: 0px; height: 261.6px; border-spacing: 5px;"><colgroup><col style="width: 7.02367%;"></col><col style="width: 92.9744%;"></col></colgroup><tbody><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Security\_key</span>

</td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**Flash Drive**

We will need a USB Flash Drive to install the operating system on our computer and enable us to install server applications. This will need to be at least 8GB to fit the free Debian Linux image we will be downloading.

</td></tr><tr style="height: 43.6px;"><td class="align-center" style="height: 43.6px; border-width: 0px; padding: 5px;"><span class="material-symbols-outlined">Hard\_drive</span></td><td class="align-left" style="height: 43.6px; border-width: 0px; padding: 5px;">**External Storage Drive**

Connecting an external hard drive to our server – using USB, eSata or Thunderbolt – can expand your storage beyond what will fit inside your computer case.

Even more importantly, an external hard drive provides an easily accessible option for creating backups in the event there is a systems failure.

</td></tr></tbody></table>

# Domain

You will need a domain name – such as [example.com](https://example.com) – to directly access your services from outside your [Local Area Network](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?") (LAN). We will using this domain name to forward traffic to our Public IP address on the [Wide Area Network](https://hub.subspace.services/books/world-wide-web/page/what-are-computer-networks "What are Computer Networks?") (WAN).

<div drawio-diagram="1077"><img src="https://hub.subspace.services/uploads/images/drawio/2025-05/drawing-3-1746069523.png" alt=""/></div>

You can also access your services away from [home without a domain by using a VPN](https://hub.subspace.services/books/world-wide-web/page/how-to-remotely-connect "How to Remotely Connect"). Using a domain name can add a level of convenience for accessing your own services while [still restricting access to your local area network](https://hub.subspace.services/books/world-wide-web/page/lan-only-access "LAN-Only Access").

## Web Domain

Domain names are purchased through a domain registrar and there is a wide potential price range. Registrars often algorithmically assign prices for available domains based on [expected popularity](https://www.name.com/blog/how-much-does-a-domain-name-cost-a-breakdown-of-domain-pricing) and [ICANN](https://www.icann.org/) registration fees.

## Dynamic DNS   


There are also free services that allow you to register an account and link your web server to their domain as a subdomain – such as [DuckDNS](https://duckdns.org) or a similar [Dynamic DNS](https://en.m.wikipedia.org/wiki/Dynamic_DNS) service on your router. These give you a sub-domain name to use – such as <span style="text-decoration: underline;">user.duckdns.org</span> – that can be automatically updated to point at your server.

[<button class="nav-button" type="button">Learn More</button>](https://hub.subspace.services/books/world-wide-web/page/getting-a-domain-name "Learn More")

# VPN Provider

<span style="white-space: pre-wrap;">Your </span>[Internet Service Provider](https://en.m.wikipedia.org/wiki/Internet_service_provider)<span style="white-space: pre-wrap;"> has the power to see information about the websites and data services you access while using their modem. While they cannot see the data being transmitted, they can see the servers you connect to. This is often used to </span>[build user profiles](https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few)<span style="white-space: pre-wrap;"> for </span>[targeted advertising](https://www.privacyguides.org/en/basics/common-threats/#surveillance-as-a-business-model)<span style="white-space: pre-wrap;"> or enforcing copyright law on peer-to-peer traffic.</span>

## Aggregation

We can lessen this by creating a private, encrypted tunnel to a VPN server connected elsewhere in the world. This will not provide total anonymity, but it can help obscure your traffic and make it harder to tell your traffic from other clients.

<div drawio-diagram="828"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1744160305.png" alt=""/></div>

<span style="white-space: pre-wrap;">Behind a </span>[Virtual Private Network](https://en.m.wikipedia.org/wiki/Virtual_private_network), your ISP can see that you've connected to a remote server but the traffic between is encrypted. Your web data is aggregated with other users to make your traffic less traceable back to you. This can also channel your Internet traffic to a specific geographic region.

<div drawio-diagram="829"><img src="https://hub.subspace.services/uploads/images/drawio/2025-04/drawing-3-1744160329.png" alt=""/></div>

<span style="white-space: pre-wrap;">If you're looking for additional privacy from your internet service provider – such as downloading files with </span>[qBittorrent](https://hub.subspace.services/books/qbittorrent "qBittorrent")<span style="white-space: pre-wrap;"> or obscuring your </span>[AdGuard Home](https://hub.subspace.services/books/adguard-home "AdGuard Home")<span style="white-space: pre-wrap;"> lookups – then a VPN service could be an option. </span>[Gluetun](https://hub.subspace.services/books/gluetun "Gluetun •")<span style="white-space: pre-wrap;"> can connect individual containers to your VPN allowing you to circumvent geo-restrictions by changing your location – such as a </span>[MeTube](https://hub.subspace.services/books/metube "MeTube")<span style="white-space: pre-wrap;"> server that can access Swedish internet content.</span>

<p class="callout info"><span style="white-space: pre-wrap;">Learn more about the </span>[advantages of using a VPN provider](https://www.privacyguides.org/en/basics/vpn-overview/)<span style="white-space: pre-wrap;">. </span></p>

## Privacy Assurance

<span style="white-space: pre-wrap;">Not all VPNs are created equal and they have the same opportunities to snoop on your data just like your ISP. They may store logs and </span>[submit them to law enforcement agencies](https://www.theregister.com/2011/09/26/hidemyass_lulzsec_controversy/)<span style="white-space: pre-wrap;"> when asked. If they don't follow industry practice, they may have their databases </span>[hacked](https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/)<span style="white-space: pre-wrap;">. Some providers have been implicated in data collections for </span>[government surveillance purposes](https://www.mintpressnews.com/exposed-how-israeli-spies-control-your-vpn/288259/)<span style="white-space: pre-wrap;">. Others </span>[use your data to build user profiles they can sell to brokers](https://www.tomsguide.com/computing/vpns/60-percent-of-free-vpns-could-be-selling-your-data-by-2025)<span style="white-space: pre-wrap;">. </span>

<table class="align-center" id="bkmrk--5" style="border-width: 0px;"><colgroup><col style="width: 240px;"></col><col style="width: 240px;"></col><col style="width: 240px;"></col></colgroup><tbody><tr style="height: 10px;"><td>[![1000006921.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006921.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006921.png)

</td><td>[![1000006922.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006922.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/1000006922.png)

</td><td>[![Untitled-1.png](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/untitled-1.png)](https://hub.subspace.services/uploads/images/gallery/2025-04/scaled-1680-/untitled-1.png)

</td></tr></tbody></table>

<span style="white-space: pre-wrap;">VPN providers can, however, volunteer for third-party audits to ensure consumer privacy and build community trust. </span>[Privacy Guides](https://www.privacyguides.org/en/)<span style="white-space: pre-wrap;"> is a non-profit that educates about personal privacy and independently reviews service providers. They recommend </span>[Proton VPN](https://www.privacyguides.org/en/vpn/#proton-vpn)<span style="white-space: pre-wrap;">, </span>[Mullvad](https://www.privacyguides.org/en/vpn/#mullvad)<span style="white-space: pre-wrap;">, and </span>[IVPN](https://www.privacyguides.org/en/vpn/#ivpn)<span style="white-space: pre-wrap;"> services.</span>

# About the Author

This library was created to advocate for technological freedom, equal access and transformative social justice. [The creator](https://josh.interpretive.tech) is a designer, developer and information scientist who was shaped by [open-source technologies](https://hub.subspace.services/books/an-open-ecosystem "An Open Ecosystem").

- Positionality
- Intersectionality

## Story

- My name is Josh. I am queer, trans, non-binary and intersex. I am polyamorous with two  
    long-term live-in partners for the last 10 years. I am neurodivergent and autistic. I have dealt  
    with disability and chronic illness since I was a child, requiring multiple surgeries and life-long  
    treatment plans that have made it difficult to feel integrated into my community. I exist on the  
    fringe of what is commonly accepted within society and I can see it from a unique perspective. I  
    have longed to create a family and community for those who have felt shunned by theirs.  
    I am also a masculine-presenting White person, specifically working in technology spaces for a  
    decade. I am not judged solely on my physical being. Within our colonial and capitalist  
    systems, there is a structural authority assigned to me and I must always be conscious of  
    positionality. Even when I chose not to wield it, I am taking a stance. I have the option to hide  
    who I am, as required, for my own safety.  
    It is important to embrace the dichotomy and balance of “queerness” and “conformity” –  
    privilege and oppression. This discomfort can lead to growth and learning, building trust  
    between people and communities. Radical empathy requires seeing yourself from the  
    perspective of others and doing the work to understand not only your positionality and  
    intersectionality, but theirs. While I cannot and should not try to intuit your lived experience,  
    there are always ways to communicate.  
    I am a first generation student returning to school after dropping out as a teenager. I prefer  
    hands-on learning methods and my innate curiosity has always led me towards digging deeper.  
    I joined the MLIS program because I wanted to help people in the ways I knew how. I have  
    struggled in academic spaces but taught myself how to thrive. Now, I can help those who struggle in the ways I have. I am working on becoming a better advocate because it is not  
    enough to know about injustices and inequalities. We must do the work to transform knowledge  
    into praxis and this can mean changing the world or changing a single mind.  
    My father was a telecom engineer for a mobile phone company in the early 90s, granting  
    immense privilege through constant access to information and technology. As a teenager, I got  
    into designing and creating websites on a recycled computer with an open-source operating  
    system. Community and culture have always informed my approach to technology having  
    started out volunteering websites for local restaurants, organizations and artists. By exploring  
    my own inner artist, I have learned to appreciate the depth of expression that can exist within  
    simplicity. I write sci-fi and fantasy short stories and novellas. For work, I am currently a  
    researcher and technical writer. As a self-taught learner, I have insights on approaching  
    informal education within technology spaces. As I branched into interface design and user  
    experience, I began to see the value of assessment and evaluation.  
    I have embraced my role as an educator to build communities of practice and provide  
    opportunities for meaning-making. While I don’t think I will ever be someone who can stand in  
    front of a crowd and effortlessly orate, I can be a different kind of educator. I believe in the  
    creative and social power created through workshops and participatory sessions. I am a  
    facilitator who can meet a person at their understanding and bridge the gap.  
    Throughout my undergrad, I built relationships with local museums and libraries to develop  
    open-source technologies for everyone. As part of a local community, we created  
    educator-facilitated lesson plans that could be shared with elementary school children trapped  
    at home during the pandemic. This was a truly world-changing experience that taught me the  
    power of technology in the hands of the people, as well as the struggles of digital access.  
    Public institutions have the opportunity to create a new relationship with technology; one that they have a voice in. Technology should be created locally by the communities that need them  
    and shared globally for the potential betterment of everyone. Part of this mission is also  
    teaching people how to involve themselves. Open technologies allow us to build around mutual  
    needs by focusing on community and consensus instead of power. We create better things  
    when we work together – and we gain a deeper understanding of the potential ramifications.  
    Closed doors do nothing to broaden perspectives and radical change requires doing things

## Motivation

- There are a myriad of guides out there for creating your own server – even for people new to   
    computers. These days, the process is relatively simple and automated. I have never found   
    one viewed through a critical perspective and I feel this knowledge is imperative to information   
    freedom. We must highlight how we have created and maintained the system (often at the   
    expense of communities), while also offering ways to reflect on how we can involve ourselves   
    (and others) in systems that have been transparently crafted to be exclusionary. While the   
    technical aspects become easier, the human questions become larger as they are pushed   
    uphill: what are the social, ethical, moral, and security considerations that will affect the identity,   
    privacy and livelihood of both people and communities?   
    Technology is a convoluted and confusing mesh of topics. “Diversity in technology” is our   
    current framework for seeing ourselves represented in the technologies we use – and it should   
    encompass the diverse ways we can be included in technology. From my experience, this is   
    what’s most overwhelming for people looking to learn technology: where do I even begin?   
    By providing the basic concepts alongside more in-depth resources, participants can spark   
    curiosity to explore the web of technology. Even if you don’t want to code, your voice matters   
    when you are given the power to express yourself. “Talking back” is of critical importance if we   
    ever hope to critically examine and address our relationship with technology. While far from   
    perfect, open technologies focus on community and help people see how they might be involved   
    in the systems churning around them.   
    Technology has been a largely white cis hetero space and has predominantly worked to   
    accelerate colonial white supremacy. This has happened through the erasure of the stories   
    behind our advancements. The first “computers” were women – who programmed our first   
    digital computers – and it took until 2005 for their names to be recognized. Erasing these   
    histories has only perpetuated the idea that not everyone belongs in technology. While we can say that we need to “increase diversity in technology”, we have not worked to create a   
    welcoming space where people can see themselves in technology. We can help people   
    embrace that their voice is important and can make a difference.
- 

## Teaching Objectives

- Never a failure, always a lesson.
- Education as the practice of freedom
- One possible alternative to the banking model is the [problem-based learning](https://en.m.wikipedia.org/wiki/Problem-based_learning "Problem-based learning") model (similar to what Freire called *[problem-posing education](https://en.m.wikipedia.org/wiki/Problem-posing_education "Problem-posing education")*), in which students are encouraged to think and actively solve problems presented to them by the teacher.<sup class="reference" id="bkmrk-%5B5%5D">[<span class="cite-bracket">\[</span>5<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-5)</sup><sup class="reference" id="bkmrk-%5B6%5D">[<span class="cite-bracket">\[</span>6<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-6)</sup>
- <sup class="reference"><span class="cite-bracket">Identity</span></sup>
- Prescott, M., Ewing, R., and O’Dea, M. (2018). “Where Are We Now? Gender, Technology, and Libraries.” *Library Technology Conference*, [https://digitalcommons.macalester.edu/libtech\_conf/2018/sessions/32/](https://digitalcommons.macalester.edu/libtech_conf/2018/sessions/32/) \[download the .pptx file\]
- Yoose, B. (2015). “Your code does not exist in a vacuum.” Code4Lib Annual Conference, [https://code4lib.org/files/c4l15yoose.pdf](https://code4lib.org/files/c4l15yoose.pdf).
- Harihareswara, S. (2015, April 15). User experience is a social justice issue.Code4Lib Journal. [https://journal.code4lib.org/articles/10482](https://journal.code4lib.org/articles/10482)
- To me, the best case scenario is not that everyone instantly understands the technical concepts   
    being taught to them, but instead that they learn to grapple with how the applications of these   
    technical concepts have begun to affect their personal lives. While computers are part of our   
    everyday lives, we don’t think about them and – even more nefariously – we are taught by tech   
    companies not to think about them. I consider the lesson a success when someone can   
    articulate their questions about what these technologies mean for their privacy, or why computer   
    science history has been paved over in favor of our current narrative. As a corollary, failure   
    means completing the entire process without critical reflection.

## Philosophy   


- <div class="csl-entry" style="text-size-adjust: auto; box-sizing: border-box;">Stommel, J. (2017, October 26). Why I Don’t Grade. *Jesse Stommel*. [https://www.jessestommel.com/why-i- dont-grade/](https://www.jessestommel.com/why-i-dont-grade/)</div>
- <span style="text-size-adjust: auto; box-sizing: border-box;">Magnus, E., Faber, M., &amp; Belanger, J. (2019). [A Consideration of Power Structures (and the Tensions They Create) in Library Assessment Activities.](https://www.libraryassessment.org/wp-content/uploads/2019/09/65-Magnus-Faber-Belanger-ConsiderationOfPower.pdf) *Library Assessment Conference Proceedings*, 600–606.</span>
- Winner, L. (2004). “Technologies as forms of life.” In Kaplan, D M. (Ed.) *Readings in the Philosophy of Technology*. Rowman &amp; Littlefield, pp. 103-113. [Winner - Technologies as forms of life.pdf](https://canvas.uw.edu/courses/1783540/files/128419752?wrap=1 "Winner - Technologies as forms of life.pdf")
- They are different faces of the same coin – wonder and criticality –   
    each placed in careful balance through reflection. Community is an important aspect of   
    education; while we can learn by ourselves, we gain knowledge and ultimately grow through our   
    connections within the community of practice.   
    Qualitative growth is more important than quantitative assessment. What we learn may be   
    important, but it is just as critical to understand how we learn and why. True growth requires   
    both criticality and vulnerability with reflection as our tool for understanding the strides we’ve   
    made and the journey we still have left to go. Just as we can never know the ways a book will   
    affect its reader, we cannot objectively quantify how our lessons will affect the trajectory of their   
    day, quarter or life. As an educator, our job is – as bell hooks described – to “teach in a manner   
    that empowers students” to be "actively committed to a process of self-actualization."   
    While the “sage on the stage” has a place within instruction, I prefer to work within participatory   
    community spaces. We all learn from each other and build a collective understanding through   
    our relationships with each other. I may not be able to find the right analogy in the moment – to   
    find the spark of connection across differences in life experiences – but within a community of   
    practice, it is not my job alone. By valuing the voice of a community, we can explore the nuance   
    surrounding what it means to be humans with differing needs.
- <sup class="reference"><span class="cite-bracket">Freire's intended audience is radicals—people who see the world as changing and fluid—and he admits that his argument will most likely be missing necessary elements to construct pedagogies in given material realities.<sup class="reference" id="bkmrk-%5B1%5D">[\[1\]](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup><sup class="reference nowrap"><span title="Pages: 37–39">: 37–39 </span></sup> Basing his method of finding freedom on the poor and middle class's experience with education, Freire states that his ideas are rooted in reality—not purely theoretical.<sup class="reference" id="bkmrk-%5B1%5D-1">[\[1\]](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup><sup class="reference nowrap"><span title="Page: 37">: 37 </span></sup></span></sup>
- We learn facts out of context of application in school. How will this history, science, math show up in our lives, in the work of growing community and home?
- We learn as children to swallow our tears and any other inconvenient emotions, and as adults that translates into working through red flags, value differences, pain, and exhaustion.
- We learn that tests and deadlines are the reasons to take action. This puts those with good short-term memories and a positive response to pressure in leadership positions, leading to urgency-based thinking, regardless of the circumstance.
- We learn that the natural world is to be manicured, controlled, or pillaged to support our consumerist lives. Even the natural lives of our bodies get medicated, pathologized, shaved or improved upon with cosmetic adjustments.
- To educate as the practice of freedom is a way of teaching that anyone can learn. That learning process comes easiest to those of us who teach who also believe that there is an aspect of our vocation that is sacred; who believe that our work is not merely to share information but to share in the intellectual and spiritual growth of our students. To teach in a manner that respects and cares for the souls of our students is essential if we are to provide the necessary conditions where learning can most deeply and intimately begin (hooks 1994: 13)
- In the book, Freire calls traditional pedagogy the "[banking model of education](https://en.m.wikipedia.org/wiki/Banking_model_of_education "Banking model of education")" because it treats the student as an empty vessel to be filled with knowledge, like a [piggy bank](https://en.m.wikipedia.org/wiki/Piggy_bank "Piggy bank"). He argues that pedagogy should instead treat the learner as a co-creator of knowledge.<sup class="reference" id="bkmrk-%5B1%5D-2">[<span class="cite-bracket">\[</span>1<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup>
- <sup class="reference"><span class="cite-bracket">[https://en.m.wikipedia.org/wiki/Banking\_model\_of\_education](https://en.m.wikipedia.org/wiki/Banking_model_of_education)</span></sup>
- <sup class="reference"><span class="cite-bracket">Freire argued that this model reinforces a lack of [critical thinking](https://en.m.wikipedia.org/wiki/Critical_thinking "Critical thinking") and knowledge ownership in students, which in turn reinforces [oppression](https://en.m.wikipedia.org/wiki/Oppression "Oppression"), in contrast to Freire's understanding of [knowledge](https://en.m.wikipedia.org/wiki/Knowledge "Knowledge") as the result of a human, creative process.<sup class="reference" id="bkmrk-%5B1%5D-3">[\[1\]](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-Freire_anthologized-1)</sup></span></sup>
- Freire describes this form of education as "fundamentally *narrative* (in) character"<sup class="reference" id="bkmrk-%5B3%5D">[<span class="cite-bracket">\[</span>3<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-PO-3)</sup><sup class="reference nowrap"><span title="Page / location: 57">: 57 </span></sup> with the teacher as the subject (that is, the active participant) and the students as passive objects.
    
    > Instead of communicating, the teacher issues communiqués and makes deposits which the students patiently receive, memorize, and repeat. This is the "banking" [concept of education](https://en.m.wikipedia.org/wiki/Definitions_of_education "Definitions of education"), in which the scope of action allowed to students extends only as far as receiving, filing, and storing the deposits.<sup class="reference" id="bkmrk-%5B3%5D-1">[<span class="cite-bracket">\[</span>3<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-PO-3)</sup><sup class="reference nowrap"><span title="Page / location: 58">: 58 </span></sup>
- In the banking concept of education, knowledge is a gift bestowed by those who consider themselves knowledgeable upon those whom they consider to know nothing. ... The teacher presents himself to his students as their necessary opposite; by considering their ignorance absolute, he justifies his own existence.<sup class="reference" id="bkmrk-%5B3%5D-2">[<span class="cite-bracket">\[</span>3<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-PO-3)</sup><sup class="reference nowrap"><span title="Page / location: 58">: 58 </span></sup>
- Banking education follows the *transmission model* of education. This model views education as a specific body of knowledge that is transmitted from the teacher to the student. It emphasizes teacher-centric learning where students are passive absorbers of information and that the purpose of learning is memorization of facts.<sup class="reference" id="bkmrk-%5B4%5D">[<span class="cite-bracket">\[</span>4<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Banking_model_of_education#cite_note-4)</sup>
- any radical pedagogy must insist that everyone’s presence is acknowledged. That insistence cannot be simply stated. It has to be demonstrated through pedagogical practices. To begin, the professor must genuinely value everyone’s presence.
- Progressive, holistic education, “engaged pedagogy” is more demanding that conventional critical or feminist pedagogy. For, unlike these two teaching practices, it emphasizes well-being. That means that teachers must be actively involved committed to a process of self-actualization that promotes their own well-being if they are to teach in a manner that empowers students. (hooks 1994: 15)
- <sup class="reference"><span class="cite-bracket"><sup class="reference nowrap"><span title="Page: 37"><span title="Page: 58">Freire's idea of dialogue. He first explains the importance of words, and that they must reflect both action and reflection. Dialogue is an understanding between different people, and it is an act of love, humility, and faith. It provides others with the complete independence to experience the world and name it how they see it. Freire explains that educators shape how students see the world and history. They must use language with the point of view of the students in mind. They must allow "thematic investigation": the discovery of different relevant problems ([limited situations](https://en.m.wikipedia.org/wiki/Limit_situation "Limit situation")) and ideas for different periods.<sup class="reference" id="bkmrk-%5B1%5D-4">[\[1\]](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup></span></span></sup></span></sup>
- “teachers must be actively committed to a process of self-actualization that promotes their own wellbeing if they are to teach in a manner that empowers students.”
- *“The purpose of education, finally, is to create in a person the ability to look at the world for himself, to make his own decisions… What societies really, ideally, want is a citizenry which will simply obey the rules of society. If a society succeeds in this, that society is about to perish. **The obligation of anyone who thinks of himself as responsible is to examine society and try to change and fight it – at no matter what risk**. This is the only hope that society has. This is the only way societies change.”*
    
    *—* James Baldwin, “*<u>[A Talk to Teachers](https://books.google.com/books?id=Dy_uAAAAMAAJ&ref=hybridpedagogy.org),</u>*” 1963
- No level of individual self-actualization alone can sustain the marginalized and oppressed. We must be linked to collective struggle, to communities of resistance that move us outward, into the world.
- It is certain, in any case, that ignorance, allied with power, is the most ferocious enemy justice can have. —James Baldwin
- <sup class="reference"><span class="cite-bracket"><sup class="reference nowrap"><span title="Page: 37">It is easy for the oppressed to fight their oppressors, only to become the opposites of what they currently are. In other words, this just makes them the oppressors and starts the cycle all over again. To be fully human again, they must identify the oppressors. They must identify them and work together to seek liberation. The next step in liberation is to understand what the goal of the oppressors is.<sup class="reference" id="bkmrk-%5B1%5D-5">[\[1\]](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup><span title="Page: 58">: 58 </span></span></sup></span></sup>
- The professors present at the first meeting were disturbed by our overt political standpoints. Again and again, it was necessary to remind everyone that no education is politically neutral. Emphasizing that a white male professor in an English department who teaches only work by “great white men” is making a political decision, \[they\] had to work consistently against and through the overwhelming will on the part of folks to deny the politics of racism, sexism, and so forth that inform how we teach.
- During this time, he noticed that his students had an unconscious [fear of freedom](https://en.m.wikipedia.org/wiki/Fear_of_Freedom "Fear of Freedom"), or rather: a fear of changing the way the world is.<sup class="reference" id="bkmrk-%5B1%5D-6">[<span class="cite-bracket">\[</span>1<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup><sup class="reference nowrap"><span title="Page: 35">: 35 </span></sup> Freire then outlines the likely criticisms he believes his book will face.<sup class="reference" id="bkmrk-%5B1%5D-7">[<span class="cite-bracket">\[</span>1<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Pedagogy_of_the_Oppressed#cite_note-:0-1)</sup><sup class="reference nowrap"><span title="Page: 37">: 37 </span></sup>
- 
- ***Escape from Freedom*** is a book by psychoanalyst [Erich Fromm](https://en.m.wikipedia.org/wiki/Erich_Fromm "Erich Fromm"), first published under that title in the United States by [Farrar &amp; Rinehart](https://en.m.wikipedia.org/wiki/Farrar_%26_Rinehart "Farrar & Rinehart")<sup class="reference" id="bkmrk-%5B1%5D-8">[<span class="cite-bracket">\[</span>1<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Escape_from_Freedom#cite_note-Funk-1)</sup> in 1941 and a year later as ***The Fear of Freedom*** in the UK by [Routledge &amp; Kegan Paul](https://en.m.wikipedia.org/wiki/Routledge_%26_Kegan_Paul "Routledge & Kegan Paul"). It was translated into German and first published in 1952 under the title ***Die Angst vor der Freiheit*** (The Fear of Freedom). In the book, Fromm explores humanity's shifting relationship with freedom, how individual freedom can cause fear, anxiety and [alienation](https://en.m.wikipedia.org/wiki/Social_alienation "Social alienation"), and how many people seek relief by relinquishing freedom. He describes how [authoritarianism](https://en.m.wikipedia.org/wiki/Authoritarianism "Authoritarianism") can be a mechanism of escape for such people, with special emphasis on the [psychosocial](https://en.m.wikipedia.org/wiki/Psychosocial "Psychosocial") conditions that enabled the rise of [Nazism](https://en.m.wikipedia.org/wiki/Nazism "Nazism").
- A **community of practice** (**CoP**) is a group of people who "share a concern or a passion for something they do and learn how to do it better as they interact regularly".<sup class="reference" id="bkmrk-%5B1%5D-9">[<span class="cite-bracket">\[</span>1<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Community_of_practice#cite_note-1)</sup> The concept was first proposed by [cognitive anthropologist](https://en.m.wikipedia.org/wiki/Cognitive_anthropology "Cognitive anthropology") [Jean Lave](https://en.m.wikipedia.org/wiki/Jean_Lave "Jean Lave") and educational theorist [Etienne Wenger](https://en.m.wikipedia.org/wiki/Etienne_Wenger "Etienne Wenger") in their 1991 book *Situated Learning*.<sup class="reference" id="bkmrk-%5B2%5D">[<span class="cite-bracket">\[</span>2<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Community_of_practice#cite_note-Lave_&_Wenger,_1991-2)</sup> Wenger significantly expanded on this concept in his 1998 book *Communities of Practice*.<sup class="reference" id="bkmrk-%5B3%5D-3">[<span class="cite-bracket">\[</span>3<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Community_of_practice#cite_note-Wenger,_1998-3)</sup> A CoP can form around members' shared interests or goals. Through being part of a CoP, the members learn from each other and develop their identities.<sup class="reference" id="bkmrk-%5B2%5D-1">[<span class="cite-bracket">\[</span>2<span class="cite-bracket">\]</span>](https://en.m.wikipedia.org/wiki/Community_of_practice#cite_note-Lave_&_Wenger,_1991-2)</sup>
- <sup class="reference"><span class="cite-bracket">For [Etienne Wenger](https://en.m.wikipedia.org/wiki/Etienne_Wenger "Etienne Wenger"), [learning](https://en.m.wikipedia.org/wiki/Learning "Learning") in a CoP is central to [identity](https://en.m.wikipedia.org/wiki/Identity_(social_science) "Identity (social science)") because learning is conceptualized as social participation – the individual actively participates in the practices of social communities, thus developing their role and identity within the community.<sup class="reference" id="bkmrk-%5B7%5D">[\[7\]](https://en.m.wikipedia.org/wiki/Community_of_practice#cite_note-Wenger_et_al.,_2002-7)</sup> In this context, a community of practice is a group of individuals with shared interests or goals who develop both their individual and shared identities through community participation.</span></sup>
- <sup class="reference"><span class="cite-bracket">A [project team](https://en.m.wikipedia.org/wiki/Project_team "Project team") is driven by deliverables with shared goals, milestones and results. A community of practice is often organically created, with as many objectives as members of that community.  
    </span></sup>

# Next Steps

Now that we have a better understanding of the project we're undertaking and the hardware that will be required, we can purchase and begin to setup our hardware.

<span class="icon-header"><span class="material-symbols-outlined" style="background-color: #859900;">host</span></span>

[<button class="nav-button" type="button">See the Hardware Guide</button>](https://hub.subspace.services/books/hardware "Hardware Guide")