<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Pi Stack</title><link>https://www.pistack.xyz/tags/security/</link><description>Recent content in Security on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Fleet vs Wazuh vs Teleport: Self-Hosted Endpoint Management &amp; Device Compliance Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-21-fleet-osquery-vs-wazuh-vs-teleport-self-hosted-endpoint-management-guide-2026/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-21-fleet-osquery-vs-wazuh-vs-teleport-self-hosted-endpoint-management-guide-2026/</guid><description>&lt;p>Managing hundreds or thousands of endpoints — servers, workstations, laptops, and containers — is one of the most com&lt;a href="https://www.plex.tv/">plex&lt;/a> operational challenges for infrastructure teams. Commercial endpoint management platforms like Jamf, CrowdStrike Falcon, and Tanium charge per-device licensing fees that scale into tens of thousands of dollars annually. They also require your telemetry data to flow through third-party cloud infrastructure.&lt;/p></description></item><item><title>Self-Hosted Supply Chain Security: Sigstore/Cosign vs Notation vs in-toto 2026</title><link>https://www.pistack.xyz/posts/2026-04-21-self-hosted-supply-chain-security-cosign-notation-intoto-2026/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-21-self-hosted-supply-chain-security-cosign-notation-intoto-2026/</guid><description>&lt;p>Software supply chain attacks have grown exponentially in recent years. Compromised packages, tampered container images, and unauthorized code modifications threaten every organization that builds and deploys software. Self-hosted supply chain security tools give you full control over artifact signing, verification, and provenance — without trusting third-party SaaS platforms.&lt;/p></description></item><item><title>Best Self-Hosted TLS Termination Proxy: Traefik vs Caddy vs HAProxy (2026)</title><link>https://www.pistack.xyz/posts/self-hosted-tls-termination-proxy-traefik-caddy-haproxy-guide-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-tls-termination-proxy-traefik-caddy-haproxy-guide-2026/</guid><description>&lt;p>A TLS termination proxy sits at the edge of your network, handling HTTPS decryption so your backend services don&amp;rsquo;t have to. It manages SSL certificates, enforces TLS versions, and offloads cryptographic overhead from your applications. For self-hosters running multiple services behind a single public IP, a good TLS termination proxy is essential infrastructure. If you&amp;rsquo;re also evaluating &lt;a href="../haproxy-vs-envoy-vs-%5Bnginx%5D(https://nginx.org/)-load-balancer-guide/">load balancing options&lt;/a>, note that many load balancers double as TLS termination proxies — the line between the two roles is often blurred.&lt;/p></description></item><item><title>DefectDojo vs Greenbone vs Faraday: Best Self-Hosted Vulnerability Management 2026</title><link>https://www.pistack.xyz/posts/2026-04-20-defectdojo-vs-greenbone-vs-faraday-self-hosted-vulnerability-management-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-20-defectdojo-vs-greenbone-vs-faraday-self-hosted-vulnerability-management-2026/</guid><description>&lt;p>Vulnerability management is the backbone of any serious security program. Rather than running scanners in isolation and drowning in CSV reports, a dedicated vulnerability management platform aggregates findings from multiple sources, deduplicates results, tracks remediation progress, and generates compliance-ready reports — all from a single self-hosted dashboard.&lt;/p></description></item><item><title>External Secrets Operator vs Sealed Secrets vs Vault Secrets Operator: Kubernetes Secrets Management 2026</title><link>https://www.pistack.xyz/posts/2026-04-20-external-secrets-operator-vs-sealed-secrets-vs-vault-secrets-operator-kubernetes-secrets-management-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-20-external-secrets-operator-vs-sealed-secrets-vs-vault-secrets-operator-kubernetes-secrets-management-2026/</guid><description>&lt;p>Managing secrets in &lt;a href="https://kubernetes.io/">kubernetes&lt;/a> is one of the most critical challenges for platform engineers running self-hosted clusters. The native &lt;code>Secret&lt;/code> object stores data as base64-encoded strings — not encrypted at rest by default — making it unsuitable for production workloads without additional tooling.&lt;/p></description></item><item><title>gVisor vs Kata Containers vs Firecracker: Container Sandboxing Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-20-gvisor-vs-kata-containers-vs-firecracker-container-sandboxing-guide-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-20-gvisor-vs-kata-containers-vs-firecracker-container-sandboxing-guide-2026/</guid><description>&lt;p>When you run containers on a shared kernel, a single exploit can compromise every workload on that host. Container runtimes like &lt;a href="https://www.docker.com/">docker&lt;/a> and containerd rely on Linux namespaces and cgroups for isolation — effective for accidental misconfiguration, but insufficient against a determined attacker who escapes the container boundary. Sandbox runtimes solve this by adding an additional isolation layer between the container and the host kernel.&lt;/p></description></item><item><title>Kube-Bench vs Trivy vs Kubescape: Container &amp; Kubernetes Hardening Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-20-kube-bench-vs-trivy-vs-kubescape-container-kubernetes-hardening-guide-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-20-kube-bench-vs-trivy-vs-kubescape-container-kubernetes-hardening-guide-2026/</guid><description>&lt;p>Running containers and &lt;a href="https://kubernetes.io/">kubernetes&lt;/a> clusters in production without security scanning is like leaving your server&amp;rsquo;s front door unlocked. Misconfigurations, outdated base images, overly permissive RBAC policies, and exposed secrets are the top causes of container breaches. The good news: you don&amp;rsquo;t need expensive commercial tools to catch them.&lt;/p></description></item><item><title>Shuffle SOAR vs StackStorm vs IRIS: Self-Hosted Security Automation &amp; Incident Response Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-20-shuffle-soar-vs-stackstorm-vs-iris-security-automation-incident-response-guide-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-20-shuffle-soar-vs-stackstorm-vs-iris-security-automation-incident-response-guide-2026/</guid><description>&lt;p>When a security alert fires at 3 AM, your team needs more than just a notification — it needs action. Security Orchestration, Automation, and Response (SOAR) platforms bridge the gap between alert detection and incident resolution. They connect your existing tools, automate repetitive tasks, and give analysts a single workspace to manage investigations.&lt;/p></description></item><item><title>AIDE vs OSSEC vs Tripwire: Self-Hosted File Integrity Monitoring Guide 2026</title><link>https://www.pistack.xyz/posts/self-hosted-file-integrity-monitoring-aide-ossec-tripwire-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-file-integrity-monitoring-aide-ossec-tripwire-guide-2026/</guid><description>&lt;p>File integrity monitoring (FIM) is one of the most fundamental security controls for any self-hosted infrastructure. It answers a critical question: &lt;strong>has someone modified files on my server without authorization?&lt;/strong> Whether it&amp;rsquo;s a compromised binary, a backdoored configuration file, or an attacker planting a rootkit, file integrity monitoring detects changes to critical system files before they can cause damage.&lt;/p></description></item><item><title>Casbin vs OPA vs Cedar: Best Self-Hosted Authorization Engines 2026</title><link>https://www.pistack.xyz/posts/casbin-vs-opa-vs-cedar-self-hosted-authorization-engines-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/casbin-vs-opa-vs-cedar-self-hosted-authorization-engines-2026/</guid><description>&lt;p>When building self-hosted applications, &lt;strong>authorization is often the hardest part to get right&lt;/strong>. Hardcoding access checks into application code leads to tangled logic, security bugs, and painful refactoring when business rules change.&lt;/p></description></item><item><title>cert-manager vs LEGO vs acme.sh: Self-Hosted TLS Certificate Automation Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-19-cert-manager-vs-lego-vs-acme-sh-self-hosted-tls-certificate-automation-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-19-cert-manager-vs-lego-vs-acme-sh-self-hosted-tls-certificate-automation-guide-2026/</guid><description>&lt;p>Managing TLS certificates manually is one of the most common causes of service outages. Expired certificates bring down websites, break API endpoints, and disrupt email delivery. In 2026, the solution is straightforward: automate certificate provisioning and renewal using a self-hosted ACME client.&lt;/p></description></item><item><title>Checkov vs tfsec vs Trivy: Self-Hosted IaC Security Scanning 2026</title><link>https://www.pistack.xyz/posts/checkov-vs-tfsec-vs-trivy-self-hosted-iac-security-scanning-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/checkov-vs-tfsec-vs-trivy-self-hosted-iac-security-scanning-2026/</guid><description>&lt;p>Infrastructure-as-code has become the standard for provisioning cloud resources, &lt;a href="https://kubernetes.io/">kubernetes&lt;/a> clusters, and container deployments. But with every Terraform module, Helm chart, and &lt;a href="https://www.docker.com/">docker&lt;/a>file committed to version control comes a critical question: &lt;strong>is your infrastructure configuration actually secure?&lt;/strong>&lt;/p></description></item><item><title>Falco vs Osquery vs Auditd: Best Self-Hosted Runtime Security 2026</title><link>https://www.pistack.xyz/posts/falco-vs-osquery-vs-auditd-self-hosted-runtime-security-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/falco-vs-osquery-vs-auditd-self-hosted-runtime-security-guide-2026/</guid><description>&lt;p>Runtime security is the last line of defense in your infrastructure. When firewalls, intrusion detection systems like those covered in our &lt;a href="../2026-04-18-suricata-vs-snort-vs-zeek-self-hosted-ids-ips-guide-2026/">Suricata vs Snort vs Zeek guide&lt;/a>, and network perimeter controls fail, runtime security tools detect malicious behavior as it happens — unauthorized process spawns, unexpected network connections, file tampering, and privilege escalation attempts.&lt;/p></description></item><item><title>OpenDNSSEC vs Knot DNS vs BIND: Self-Hosted DNSSEC Management Guide 2026</title><link>https://www.pistack.xyz/posts/opendnssec-vs-knot-dns-vs-bind-self-hosted-dnssec-management-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/opendnssec-vs-knot-dns-vs-bind-self-hosted-dnssec-management-guide-2026/</guid><description>&lt;p>DNS Security Extensions (DNSSEC) protect your domains from cache poisoning, DNS spoofing, and man-in-the-middle attacks by cryptographically signing DNS records. But managing DNSSEC keys, signing zones, and handling automated key rollovers is com&lt;a href="https://www.plex.tv/">plex&lt;/a> — especially across dozens or hundreds of zones.&lt;/p></description></item><item><title>OWASP ZAP vs Nuclei vs Nikto: Best DAST Scanner 2026</title><link>https://www.pistack.xyz/posts/owasp-zap-vs-nuclei-vs-nikto-self-hosted-dast-scanning-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/owasp-zap-vs-nuclei-vs-nikto-self-hosted-dast-scanning-guide-2026/</guid><description>&lt;p>Dynamic Application Security Testing (DAST) is a critical layer in any security pipeline. Unlike static analysis tools that examine source code, DAST scanners interact with running applications to discover vulnerabilities as an attacker would — probing for SQL injection, XSS, misconfigurations, and outdated software versions.&lt;/p></description></item><item><title>PacketFence vs FreeRADIUS vs CoovaChilli: Self-Hosted NAC Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-19-packetfence-vs-freeradius-vs-coovachilli-self-hosted-nac-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-19-packetfence-vs-freeradius-vs-coovachilli-self-hosted-nac-guide-2026/</guid><description>&lt;p>Network Access Control (NAC) is one of the most critical security layers for any organization that manages physical or wireless networks. Without it, any device with an Ethernet cable or WiFi password can join your network and access resources freely. NAC solutions enforce authentication, authorization, and accounting (AAA) — verifying who is connecting, what they&amp;rsquo;re allowed to access, and logging their activity.&lt;/p></description></item><item><title>privacyIDEA vs LinOTP: Self-Hosted MFA Server Comparison 2026</title><link>https://www.pistack.xyz/posts/privacyidea-vs-linotp-self-hosted-mfa-server-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/privacyidea-vs-linotp-self-hosted-mfa-server-guide-2026/</guid><description>&lt;p>Multi-factor authentication (MFA) is one of the most effective security controls you can deploy. But relying on cloud-based MFA providers like Duo, Authy, or Okta means your authentication flow depends on third-party infrastructure — and their terms, pricing, and availability.&lt;/p></description></item><item><title>Self-Hosted Certificate Monitoring 2026: Certimate vs x509-Certificate-Exporter vs CertSpotter</title><link>https://www.pistack.xyz/posts/2026-04-19-self-hosted-certificate-monitoring-expiry-alerting-certimate-x509-exporter-certspotter-guide-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-19-self-hosted-certificate-monitoring-expiry-alerting-certimate-x509-exporter-certspotter-guide-2026/</guid><description>&lt;p>Managing SSL/TLS certificates across multiple servers, domains, and services is one of the most common operational challenges for self-hosters and system administrators. An expired certificate means downtime, broken APIs, and lost trust — yet it remains one of the most preventable outages.&lt;/p></description></item><item><title>Best Self-Hosted Antivirus &amp; Malware Scanning Tools for Linux Servers in 2026</title><link>https://www.pistack.xyz/posts/self-hosted-antivirus-malware-scanning-clamav-maldet-rkhunter-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-antivirus-malware-scanning-clamav-maldet-rkhunter-guide-2026/</guid><description>&lt;p>Running your own servers means taking responsibility for their security. While firewalls and intrusion detection systems protect against network-level threats, you also need on-host malware scanning to catch malicious files, rootkits, and trojans that bypass perimeter defenses.&lt;/p></description></item><item><title>BunkerWeb vs ModSecurity vs CrowdSec: Best Self-Hosted WAF Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-18-bunkerweb-vs-modsecurity-vs-crowdsec-self-hosted-waf-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-18-bunkerweb-vs-modsecurity-vs-crowdsec-self-hosted-waf-guide-2026/</guid><description>&lt;p>Protecting web applications from attacks like SQL injection, cross-site scripting (XSS), and bot abuse is essential — whether you run a single blog or a multi-tenant platform. Commercial WAFs (Cloudflare, AWS WAF) cost money and route your traffic through third-party infrastructure. Self-hosted open-source alternatives give you full control over your security posture without the per-request pricing.&lt;/p></description></item><item><title>MISP vs OpenCTI vs IntelOwl: Best Self-Hosted Threat Intelligence Platform 2026</title><link>https://www.pistack.xyz/posts/misp-vs-opencti-vs-intelowl-self-hosted-threat-intelligence-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/misp-vs-opencti-vs-intelowl-self-hosted-threat-intelligence-guide-2026/</guid><description>&lt;p>Threat intelligence has become a cornerstone of modern cybersecurity operations. Security teams need to enrich indicators of compromise (IOCs), correlate attack patterns, and share actionable intel across organizations — all without sending sensitive data to third-party cloud providers. In 2026, three open-source platforms dominate the self-hosted threat intelligence landscape: &lt;strong>MISP&lt;/strong>, &lt;strong>OpenCTI&lt;/strong>, and &lt;strong>IntelOwl&lt;/strong>. Each takes a different approach to collecting, organizing, and acting on threat data. This guide compares all three in detail, with complete &lt;a href="https://www.docker.com/">docker&lt;/a> deployment instructions so you can run any of them on your own infrastructure.&lt;/p></description></item><item><title>OAuth2-Proxy vs Pomerium vs Traefik-Forward-Auth: Best Self-Hosted Auth Proxy 2026</title><link>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</guid><description>&lt;p>If you self-host web applications — dashboards, admin panels, internal tools, or APIs — one of the first questions you face is: &lt;strong>how do I protect them from unauthorized access?&lt;/strong>&lt;/p></description></item><item><title>SpiceDB vs OpenFGA vs Permify: Self-Hosted Authorization Engines 2026</title><link>https://www.pistack.xyz/posts/spicedb-vs-openfga-vs-permify-self-hosted-fine-grained-authorization-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/spicedb-vs-openfga-vs-permify-self-hosted-fine-grained-authorization-guide-2026/</guid><description>&lt;p>When you move beyond simple role-based access control (RBAC), permissions get complicated fast. &amp;ldquo;Can user X view document Y, but only if they&amp;rsquo;re in the same organization, haven&amp;rsquo;t been blocked by user Z, and the document hasn&amp;rsquo;t expired?&amp;rdquo; Hard-coding that logic into your application is a recipe for bugs, security holes, and endless refactoring.&lt;/p></description></item><item><title>StrongSwan vs LibreSwan vs SoftEther: Best Self-Hosted VPN Gateway 2026</title><link>https://www.pistack.xyz/posts/strongswan-vs-libreswan-vs-softether-self-hosted-vpn-gateway-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/strongswan-vs-libreswan-vs-softether-self-hosted-vpn-gateway-guide-2026/</guid><description>&lt;p>When you need a self-hosted VPN gateway for site-to-site connectivity, remote access, or secure network bridging, the choice of VPN software matters. While tools like &lt;a href="https://www.wireguard.com/">wireguard&lt;/a> and OpenVPN dominate the consumer space, enterprise-grade deployments often require the flexibility and proven security of IPSec or multi-protocol VPN solutions.&lt;/p></description></item><item><title>Suricata vs Snort vs Zeek: Best Self-Hosted IDS/IPS Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-18-suricata-vs-snort-vs-zeek-self-hosted-ids-ips-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-18-suricata-vs-snort-vs-zeek-self-hosted-ids-ips-guide-2026/</guid><description>&lt;p>When you deploy a server or manage a home lab, a firewall alone isn&amp;rsquo;t enough. You need visibility into what&amp;rsquo;s &lt;a href="https://actualbudget.org/">actual&lt;/a>ly happening on your network — who&amp;rsquo;s scanning your ports, what protocols are being used, and whether any traffic matches known attack patterns. That&amp;rsquo;s exactly what an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) provide.&lt;/p></description></item><item><title>Complete Guide to Self-Hosted eBPF Networking and Observability: Cilium, Pixie, Tetragon 2026</title><link>https://www.pistack.xyz/posts/ebpf-networking-observability-cilium-pixie-tetragon-guide-2026/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/ebpf-networking-observability-cilium-pixie-tetragon-guide-2026/</guid><description>&lt;p>The eBPF (extended Berkeley Packet Filter) revolution has fundamentally changed how we observe, secure, and manage network infrastructure. Born from the Linux kernel, eBPF allows sandboxed programs to run inside the kernel without modifying kernel source code or loading modules. This means you can intercept network packets, trace system calls, monitor application performance, and enforce security policies — all with near-zero overhead and no instrumentation changes to your applications.&lt;/p></description></item><item><title>Firezone vs Pritunl vs NetBird: Self-Hosted WireGuard VPN Management 2026</title><link>https://www.pistack.xyz/posts/firezone-vs-pritunl-vs-netbird-self-hosted-wireguard-vpn-guide-2026/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/firezone-vs-pritunl-vs-netbird-self-hosted-wireguard-vpn-guide-2026/</guid><description>&lt;h2 id="why-self-host-your-wireguard-vpn-infrastructure">Why Self-Host Your WireGuard VPN Infrastructure&lt;/h2>
&lt;p>WireGuard has established itself as the fastest, most modern VPN protocol available. Its streamlined codebase (roughly 4,000 lines compared to OpenVPN&amp;rsquo;s 100,000+) delivers better throughput with lower latency and stronger cryptographic primitives. However, raw WireGuard lacks built-in user management, access controls, SSO integration, and a management interface — all critical for running a production-grade VPN.&lt;/p></description></item><item><title>Best Self-Hosted Honeypot Solutions: Cowrie vs T-Pot vs OpenCanary 2026</title><link>https://www.pistack.xyz/posts/self-hosted-honeypot-deception-cowrie-tpot-opencanary-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-honeypot-deception-cowrie-tpot-opencanary-guide-2026/</guid><description>&lt;p>If you run any internet-facing services at home or in a small business, you already know that automated scanners, credential-stuffing bots, and opportunistic attackers probe your network around the clock. Instead of simply blocking them, a &lt;strong>honeypot&lt;/strong> turns that constant noise into actionable intelligence. By deploying decoy services that appear vulnerable but are actually instrumented traps, you can observe attack patterns in real time, collect malware samples, and — most importantly — generate alerts that tell you when someone is actively targeting your infrastructure.&lt;/p></description></item><item><title>Best Self-Hosted Network Traffic Analysis Tools 2026: Zeek vs Arkime vs ntopng</title><link>https://www.pistack.xyz/posts/self-hosted-network-traffic-analysis-zeek-arkime-ntopng-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-network-traffic-analysis-zeek-arkime-ntopng-guide-2026/</guid><description>&lt;p>Network visibility is the foundation of effective infrastructure management. Whether you are diagnosing a stubborn latency issue, investigating a potential intrusion, auditing data flows for compliance, or simply understanding what traverses your network, a self-hosted traffic analysis platform gives you full access to the raw data without shipping packets to a third-party cloud.&lt;/p></description></item><item><title>Best Self-Hosted Phishing Simulation Tools: GoPhish vs Alternatives 2026</title><link>https://www.pistack.xyz/posts/self-hosted-phishing-simulation-security-awareness-training-gophish-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-phishing-simulation-security-awareness-training-gophish-2026/</guid><description>&lt;p>Running phishing awareness campaigns inside your organization doesn&amp;rsquo;t require expensive SaaS platforms. Open-source tools like GoPhish, King Phisher, and Social-Engineer Toolkit let you design, launch, and track realistic phishing simulations entirely on your own infrastructure. This guide covers the best self-hosted phishing simulation platforms available in 2026, with full installation instructions and configuration examples.&lt;/p></description></item><item><title>pfSense vs OPNsense vs IPFire: Best Self-Hosted Firewall Router 2026</title><link>https://www.pistack.xyz/posts/pfsense-vs-opnsense-vs-ipfire-self-hosted-firewall-router-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/pfsense-vs-opnsense-vs-ipfire-self-hosted-firewall-router-guide-2026/</guid><description>&lt;h2 id="why-you-need-a-self-hosted-firewall-router">Why You Need a Self-Hosted Firewall Router&lt;/h2>
&lt;p>A dedicated firewall router is the single most important piece of infrastructure you can deploy for a self-hosted environment. Unlike a software firewall running on a general-purpose server, a purpose-built firewall appliance sits at the edge of your network and controls every packet that enters or leaves.&lt;/p></description></item><item><title>Self-Hosted Network Traffic Analysis: Zeek vs Arkime vs Ntopng Complete Guide 2026</title><link>https://www.pistack.xyz/posts/self-hosted-network-traffic-analysis-zeek-arkime-ntopng-guide/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-network-traffic-analysis-zeek-arkime-ntopng-guide/</guid><description>&lt;p>When you rely on cloud-based network monitoring services, you hand over your most sensitive infrastructure data — every connection, every protocol, every anomaly — to a third party. For organizations handling compliance requirements (HIPAA, PCI-DSS, SOC 2) or anyone who values operational privacy, self-hosted network traffic analysis isn&amp;rsquo;t just an option, it&amp;rsquo;s a necessity.&lt;/p></description></item><item><title>Self-Hosted Rate Limiting &amp; API Throttling: NGINX vs Traefik vs Envoy vs Kong 2026</title><link>https://www.pistack.xyz/posts/self-hosted-rate-limiting-api-throttling-nginx-traefik-envoy-kong-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-rate-limiting-api-throttling-nginx-traefik-envoy-kong-guide-2026/</guid><description>&lt;p>Rate limiting is the unsung hero of infrastructure reliability. Without it, a single misbehaving client can exhaust your server resources, trigger cascading failures, and bring down your entire stack. Yet most rate limiting guides point you toward expensive cloud APIs or managed services that charge per-request and lock you into a vendor.&lt;/p></description></item><item><title>Self-Hosted Secrets Scanning: Gitleaks vs TruffleHog vs Detect-Secrets 2026</title><link>https://www.pistack.xyz/posts/self-hosted-secrets-scanning-gitleaks-trufflehog-detect-secrets-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-secrets-scanning-gitleaks-trufflehog-detect-secrets-guide-2026/</guid><description>&lt;h2 id="complete-guide-to-self-hosted-secrets-scanning-tools-2026">Complete Guide to Self-Hosted Secrets Scanning Tools 2026&lt;/h2>
&lt;p>Every week brings news of another company suffering a breach caused by hardcoded credentials, leaked API keys, or exposed certificates committed to version control. The root cause is almost always the same: sensitive material made it into a git repository, and nobody caught it before it became permanent history.&lt;/p></description></item><item><title>Self-Hosted SSH Bastion Host &amp; Jump Server Guide: Teleport, Guacamole, Trisail 2026</title><link>https://www.pistack.xyz/posts/self-hosted-ssh-bastion-jump-server-teleport-guacamole-trysail-guide-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-ssh-bastion-jump-server-teleport-guacamole-trysail-guide-2026/</guid><description>&lt;h2 id="why-self-host-an-ssh-bastion-host">Why Self-Host an SSH Bastion Host?&lt;/h2>
&lt;p>Every homelab, small team, and distributed infrastructure faces the same problem: you have dozens of servers, VMs, and containers spread across clouds and local networks, and you need secure, audited access to all of them. Opening SSH port 22 on every machine is a security nightmare. Managing individual SSH keys across a growing fleet becomes unsustainable. And when someone leaves the team, you&amp;rsquo;re manually revoking keys on every server.&lt;/p></description></item><item><title>Best Self-Hosted Rate Limiting &amp; API Throttling Solutions 2026</title><link>https://www.pistack.xyz/posts/self-hosted-rate-limiting-api-throttling-nginx-traefik-envoy-kong-2026/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-rate-limiting-api-throttling-nginx-traefik-envoy-kong-2026/</guid><description>&lt;p>Rate limiting is one of the most underrated pieces of infrastructure. Whether you are protecting a public API from abuse, preventing brute-force login attempts, or ensuring fair resource allocation across tenants, a good rate limiter sits between your users and your services — and you want full control over it.&lt;/p></description></item><item><title>Best Self-Hosted Video Surveillance &amp; NVR 2026: Frigate vs ZoneMinder vs MotionEye</title><link>https://www.pistack.xyz/posts/self-hosted-video-surveillance-nvr-frigate-zoneminder-motioneye/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-video-surveillance-nvr-frigate-zoneminder-motioneye/</guid><description>&lt;p>Running your own video surveillance system gives you complete ownership of every frame your cameras record. No cloud subscriptions, no data sent to third-party servers, and no monthly fees for recording history. In 2026, the open-source NVR (Network Video Recorder) landscape offers mature, production-ready options that rival commercial products — with the added benefits of privacy and total control.&lt;/p></description></item><item><title>Best Self-Hosted WAF &amp; Bot Protection: ModSecurity vs Coraza vs CrowdSec 2026</title><link>https://www.pistack.xyz/posts/self-hosted-waf-bot-protection-modsecurity-coraza-crowdsec-2026/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-waf-bot-protection-modsecurity-coraza-crowdsec-2026/</guid><description>&lt;h2 id="complete-guide-to-self-hosted-waf--bot-protection-2026">Complete Guide to Self-Hosted WAF &amp;amp; Bot Protection 2026&lt;/h2>
&lt;p>Every public-facing web application is under constant attack. SQL injection, cross-site scripting, credential stuffing, and automated bot scraping happen around the clock. A cloud-hosted Web Application Firewall (WAF) like Cloudflare or AWS WAF can cost anywhere from $20 to hundreds of dollars per month — and your traffic data flows through a third party.&lt;/p></description></item><item><title>Complete Guide to Self-Hosted Certificate Management and PKI 2026</title><link>https://www.pistack.xyz/posts/self-hosted-pki-certificate-management-step-ca-caddy-nginx-proxy-manager-2026/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-pki-certificate-management-step-ca-caddy-nginx-proxy-manager-2026/</guid><description>&lt;p>Every self-hosted infrastructure eventually runs into the same problem: TLS certificates. You set up a home lab, deploy a dozen services behind a reverse proxy, and suddenly you are wrestling with expired certs, self-signed warnings, and Let&amp;rsquo;s Encrypt rate limits. If you manage internal services that are not publicly accessible — databases, monitoring dashboards, container registries — public CAs cannot help you at all.&lt;/p></description></item><item><title>Dependency-Track vs Syft vs CycloneDX: Self-Hosted SBOM &amp; Dependency Tracking 2026</title><link>https://www.pistack.xyz/posts/self-hosted-sbom-dependency-tracking-dependency-track-syft-cyclonedx-guide-2026/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-sbom-dependency-tracking-dependency-track-syft-cyclonedx-guide-2026/</guid><description>&lt;p>Every modern application pulls in hundreds — sometimes thousands — of third-party packages. Each dependency carries its own dependency tree, licenses, and potential vulnerabilities. Without visibility into what ships inside your software, you cannot answer basic questions: &lt;em>Does our container include Log4j? Which packages use the GPL license? When was this component last updated?&lt;/em>&lt;/p></description></item><item><title>Best Self-Hosted Secret Management: HashiCorp Vault vs Infisical vs Passbolt 2026</title><link>https://www.pistack.xyz/posts/best-self-hosted-secret-management-vault-infisical-passbolt-2026/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/best-self-hosted-secret-management-vault-infisical-passbolt-2026/</guid><description>&lt;h2 id="why-self-host-your-secret-management">Why Self-Host Your Secret Management?&lt;/h2>
&lt;p>Every modern application stack runs on secrets: API keys, database credentials, TLS certificates, OAuth tokens, and encryption keys. Storing these in environment files, hardcoding them in configuration, or scattering them across Slack messages and wikis is one of the most common security failures in both homelabs and production environments.&lt;/p></description></item><item><title>Self-Hosted SIEM Guide: Wazuh vs Security Onion vs Elastic Security 2026</title><link>https://www.pistack.xyz/posts/self-hosted-siem-wazuh-security-onion-elastic-guide/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-siem-wazuh-security-onion-elastic-guide/</guid><description>&lt;p>Security Information and Event Management (SIEM) platforms sit at the center of any serious security operation. They collect logs from every system on your network, correlate events to detect threats, and provide the forensic data you need when something goes wrong. Commercial SIEM solutions from vendors like Splunk, IBM QRadar, and Datadog can cost tens of thousands of dollars per year — pricing that simply doesn&amp;rsquo;t work for small teams, homelabs, or budget-conscious organizations.&lt;/p></description></item><item><title>UFW vs Firewalld vs iptables: Best Linux Firewall for Self-Hosted Servers 2026</title><link>https://www.pistack.xyz/posts/self-hosted-firewall-ufw-firewalld-iptables/</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-firewall-ufw-firewalld-iptables/</guid><description>&lt;h2 id="why-a-proper-firewall-is-non-negotiable-for-self-hosted-servers">Why a Proper Firewall Is Non-Negotiable for Self-Hosted Servers&lt;/h2>
&lt;p>Every self-hosted server is exposed to the internet — and the internet is noisy. Within minutes of connecting a fresh VPS, you&amp;rsquo;ll see SSH brute-force attempts, port scans, and automated exploit probes in your logs. A properly configured firewall is your first and most critical line of defense.&lt;/p></description></item><item><title>Bitwarden vs Vaultwarden vs KeePassXC: Password Manager Comparison</title><link>https://www.pistack.xyz/posts/password-managers-comparison/</link><pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/password-managers-comparison/</guid><description>&lt;h2 id="why-self-host-your-passwords">Why Self-Host Your Passwords?&lt;/h2>
&lt;p>Storing passwords on your own server means:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Zero Knowledge&lt;/strong>: Only you can access your vault&lt;/li>
&lt;li>&lt;strong>No Breach Risk&lt;/strong>: Not a centralized target&lt;/li>
&lt;li>&lt;strong>Full Control&lt;/strong>: You manage updates and backups&lt;/li>
&lt;li>&lt;strong>Compliance&lt;/strong>: Meet data sovereignty requirements&lt;/li>
&lt;/ul>
&lt;h2 id="comparison-matrix">Comparison Matrix&lt;/h2>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Feature&lt;/th>
 &lt;th>&lt;a href="https://bitwarden.com/">bitwarden&lt;/a> (Official)&lt;/th>
 &lt;th>&lt;a href="https://github.com/dani-garcia/vaultwarden">vaultwarden&lt;/a>&lt;/th>
 &lt;th>KeePassXC&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;strong>Cost&lt;/strong>&lt;/td>
 &lt;td>Free / $10/yr&lt;/td>
 &lt;td>100% Free&lt;/td>
 &lt;td>100% Free&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Open Source&lt;/strong>&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Self-Hostable&lt;/strong>&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>❌ N/A (Local)&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Cloud Sync&lt;/strong>&lt;/td>
 &lt;td>✅ Official&lt;/td>
 &lt;td>❌ DIY&lt;/td>
 &lt;td>❌ DIY&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Mobile Apps&lt;/strong>&lt;/td>
 &lt;td>✅ Excellent&lt;/td>
 &lt;td>✅ Use BW apps&lt;/td>
 &lt;td>⚠️ Third-party&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Browser Extension&lt;/strong>&lt;/td>
 &lt;td>✅ Official&lt;/td>
 &lt;td>✅ Use BW ext&lt;/td>
 &lt;td>✅ Official&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>2FA Support&lt;/strong>&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>⚠️ Limited&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Password Sharing&lt;/strong>&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>❌ No&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Emergency Access&lt;/strong>&lt;/td>
 &lt;td>✅ Yes&lt;/td>
 &lt;td>❌ No&lt;/td>
 &lt;td>❌ No&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>Resource Usage&lt;/strong>&lt;/td>
 &lt;td>High (MSSQL)&lt;/td>
 &lt;td>Low (SQLite)&lt;/td>
 &lt;td>Minimal&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;hr>
&lt;h2 id="1-bitwarden-official-the-standard">1. Bitwarden Official (The Standard)&lt;/h2>
&lt;p>&lt;strong>Best for&lt;/strong>: Users wanting official support and features&lt;/p></description></item><item><title>Self-Hosted Privacy Stack: Complete Guide to De-Google Your Life</title><link>https://www.pistack.xyz/posts/privacy-stack-guide/</link><pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/privacy-stack-guide/</guid><description>&lt;h2 id="the-de-google-roadmap">The De-Google Roadmap&lt;/h2>
&lt;p>Google services to replace:&lt;/p>
&lt;ol>
&lt;li>&lt;strong>Gmail&lt;/strong> → Mailcow / Mailu&lt;/li>
&lt;li>&lt;strong>Google Drive&lt;/strong> → &lt;a href="https://nextcloud.com/">nextcloud&lt;/a>&lt;/li>
&lt;li>&lt;strong>Google Calendar&lt;/strong> → Nextcloud Calendar / Radicale&lt;/li>
&lt;li>&lt;strong>Google Contacts&lt;/strong> → Nextcloud Contacts / CardDAV&lt;/li>
&lt;li>&lt;strong>Google Photos&lt;/strong> → Immich / PhotoPrism&lt;/li>
&lt;li>&lt;strong>Google Docs&lt;/strong> → OnlyOffice / Collabora&lt;/li>
&lt;li>&lt;strong>Google Meet&lt;/strong> → Jitsi Meet&lt;/li>
&lt;li>&lt;strong>Google Keep&lt;/strong> → Joplin / Notesnook&lt;/li>
&lt;/ol>
&lt;h2 id="complete-privacy-stack">Complete Privacy Stack&lt;/h2>
&lt;h3 id="core-infrastructure">Core Infrastructure&lt;/h3>
&lt;div class="highlight">&lt;div class="chroma">
&lt;table class="lntable">&lt;tr>&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code>&lt;span class="lnt">1
&lt;/span>&lt;span class="lnt">2
&lt;/span>&lt;span class="lnt">3
&lt;/span>&lt;span class="lnt">4
&lt;/span>&lt;/code>&lt;/pre>&lt;/td>
&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code class="language-yaml" data-lang="yaml">&lt;span class="line">&lt;span class="cl">&lt;span class="c"># Infrastructure&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Cadd[adguard home](https://adguard.com/en/adguard-home/overview.html)roxy + SSL)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">AdGuard Home (DNS Ad Blocking)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Vaultwarden (Password Manager)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/td>&lt;/tr>&lt;/table>
&lt;/div>
&lt;/div>&lt;h3 id="communication">Communication&lt;/h3>
&lt;div class="highlight">&lt;div class="chroma">
&lt;table class="lntable">&lt;tr>&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code>&lt;span class="lnt">1
&lt;/span>&lt;span class="lnt">2
&lt;/span>&lt;span class="lnt">3
&lt;/span>&lt;span class="lnt">4
&lt;/span>&lt;/code>&lt;/pre>&lt;/td>
&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code class="language-yaml" data-lang="yaml">&lt;span class="line">&lt;span class="cl">&lt;span class="c"># Email &amp;amp; Chat&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Mailcow (Email Server)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Jitsi Meet (Video Calls)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Matrix/Synapse (Chat)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/td>&lt;/tr>&lt;/table>
&lt;/div>
&lt;/div>&lt;h3 id="productivity">Productivity&lt;/h3>
&lt;div class="highlight">&lt;div class="chroma">
&lt;table class="lntable">&lt;tr>&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code>&lt;span class="lnt">1
&lt;/span>&lt;span class="lnt">2
&lt;/span>&lt;span class="lnt">3
&lt;/span>&lt;span class="lnt">4
&lt;/span>&lt;/code>&lt;/pre>&lt;/td>
&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code class="language-yaml" data-lang="yaml">&lt;span class="line">&lt;span class="cl">&lt;span class="c"># Office Suite&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Nextcloud Hub (Files, Calendar, Contacts)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">OnlyOffice (Document Editing)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="w">&lt;/span>- &lt;span class="l">Vikunja (Task Management)&lt;/span>&lt;span class="w">
&lt;/span>&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/td>&lt;/tr>&lt;/table>
&lt;/div>
&lt;/div>&lt;h3 id="mediajellyfin">Media&lt;a href="https://jellyfin.org/">jellyfin&lt;/a>&lt;/h3>
&lt;h1 id="media-server">Media Server&lt;/h1>
&lt;ul>
&lt;li>Jellyfin (Movies &amp;amp; TV)&lt;/li>
&lt;li>Immich (Photos)&lt;/li>
&lt;li>Navidrome (Music)&lt;/li>
&lt;/ul>
&lt;div class="highlight">&lt;div class="chroma">
&lt;table class="lntable">&lt;tr>&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code>&lt;span class="lnt"> 1
&lt;/span>&lt;span class="lnt"> 2
&lt;/span>&lt;span class="lnt"> 3
&lt;/span>&lt;span class="lnt"> 4
&lt;/span>&lt;span class="lnt"> 5
&lt;/span>&lt;span class="lnt"> 6
&lt;/span>&lt;span class="lnt"> 7
&lt;/span>&lt;span class="lnt"> 8
&lt;/span>&lt;span class="lnt"> 9
&lt;/span>&lt;span class="lnt">10
&lt;/span>&lt;/code>&lt;/pre>&lt;/td>
&lt;td class="lntd">
&lt;pre tabindex="0" class="chroma">&lt;code class="language-fallback" data-lang="fallback">&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">## Quick Start: Minimum Viable Privacy Stack
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">If you can only start with 3 services:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">### 1. Nextcloud Hub
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Replaces Drive, Calendar, Contacts, Notes
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">```bash
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">docker run -d -p 8080:80 nextcloud
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/td>&lt;/tr>&lt;/table>
&lt;/div>
&lt;/div>&lt;h3 id="2-vaultwarden">2. Vaultwarden&lt;/h3>
&lt;p>Replaces Google Password Manager&lt;/p></description></item></channel></rss>