this post was submitted on 30 May 2025
259 points (95.8% liked)

Selfhosted

46672 readers
379 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Hey everyone.

I make Peersuite, an opensource free communication platform.

It's private by default, there's no sign-in or email collection.

It's peer-to-peer, there's no server, after discovery you are connected directly to your friends my AES-GCN encrypted WebRTC channels. It forms a mesh and identifies superpeers. Because there is no server, in order to save your data between sessions, you can download your workspace into a password encrypted file. Happy to answer any questions.

FEATURES: chat with images, PMs, channels, and file send group audio/video calling screensharing kanban board whiteboard for diagrams/flowchartswith PNG export collaborative document editing with formatted PDF export

The best way for self hosting is docker, its on dockerhub as openconstruct/peersuite. You can also download desktop versions from the github or use on the web at https://peersuite.space/

github - https://github.com/openconstruct/Peersuite

you are viewing a single comment's thread
view the rest of the comments
[–] jerrimu@lemmy.world 9 points 1 week ago (1 children)

That's a really good idea! Now in the roadmap.

[–] martinb@lemmy.sdf.org 3 points 1 week ago (2 children)

I feel like saving the password in the export is a bad idea if security is your thing

[–] jerrimu@lemmy.world 3 points 1 week ago (1 children)

The export is password encrypted already. I'll see if there's a good way to do it.

[–] martinb@lemmy.sdf.org 2 points 1 week ago

Fair enough, it lowers the risk. Are you doing key stretching? Ie. X rounds of pbkdf or whatever it's called?

[–] Andres4NY@social.ridetrans.it 3 points 1 week ago

@martinb @jerrimu I wrote the initial comment with the idea of saving just the username, but then figured "why not?" for the password. If the password is saved in browser memory (and based how I *think* the app functions, it would have to be), then it wouldn't be much different than saving a password in firefox's password manager (for example). Assuming reasonable crypto usage by the app, of course.