Laypeople publish on the internet single-handedly.
Safe, reliable, responsibly.
Optionally cross-post to twitter and the fediverse. As required by IndieWeb.org/POSSE.
https://mro.name/o/2021-09-30-181132-prototypefund11-222_--_en.txt
Write small texts, e.g. comment on URLs found on the internet.
Enable subscription. Post images / enclosures.
Choose a domain name and buy the smallest package at any hoster e.g variomedia.de/hosting.
While you do not technically need a domain on your own, it is the only way to sovereignty.
Therefore in fact you need one.
Common for shared hosting. Setup is automatic, no other preparations necessary.
Common for self-hosting, has reduced complexity compared to Apache.
see lighttpd.conf
Seppo consists strictly of plain text files and images on your webspace. There is no hidden storage or database involved. So it remains simple to
To purge just delete seppo.cgi and all it's created files.
Your Seppo (http://example.com/) can be both viewed directly with a browser and subscribed to as an atom feed.
incl. notification
incl. update/delete
incl. update/delete
Atom feed urn:ietf:rfc:4287 Paged urn:ietf:rfc:5005 Threaded urn:ietf:rfc:4685
Report any concerns to security@seppo.social.
The main security features of Seppo are the single-user approach, its plain text storage and the overall low complexity. All written in the safe and quality-aware ecosystem OCaml.
Seppo is built as a CGI, which some people decry as insecure and may advise you to use PHP, Node or the like instead. However, their respective engines need frequent updates, bring several orders of magnitude more complexity (and bugs) and are CGIs themselves.
Seppo stores all data in mere text files in place (no database involved) and therefore needs write access to the filesystem of its webspace. This is an attack vector to be careful about. There is exactly one user allowed to write: you. So there are no malicious users or attackers from inside.
It is paramount that Seppo doesn't modify anything unauthenticated - only exception being ban management.
Authentication has brute-force protection.
Seppo never writes outside it's location.
HTTPS is encouraged while not mandatory. Otherwise Seppo follows best practices at observatory.mozilla.org.
numbers before the UX degrades:
A single HTTP request < 100k just a plain HTTP GET to the webserver.
Adding a new entry, a HTTP POST to the seppo.cgi < 1sec.
Modifying an entry (same tags), a HTTP POST to the seppo.cgi < 1sec.
Delete an entry, a HTTP POST to the seppo.cgi < 3sec.
Quality | very good | good | normal | irrelevant |
---|---|---|---|---|
Functionality | × | |||
Reliability | × | |||
Usability | × | |||
Efficiency | × | |||
Changeability | × | |||
Portability | × |