Ric Harvey 🇪🇺🌍💚
banner
ric.mastodon.squarecows.com.ap.brid.gy
Ric Harvey 🇪🇺🌍💚
@ric.mastodon.squarecows.com.ap.brid.gy
Open Source and Raspberry Pi Enthusiast and blogger. {he/him} #fedi22 #linux #foss #raspberrypi #oss #opensource #blm

[bridged from https://mastodon.squarecows.com/@Ric on the fediverse by https://fed.brid.gy/ ]
I've been working on improving the documentation for #bovine the the #staticwebsite server for @forgejo and @gitea, you can find it here: https://bovine.squarecows.com/docs/
December 8, 2025 at 10:39 PM
@forgejo @Codeberg I’ve written an open source super light weight Pages server for forgejo based on traefik with loads of extra features not on “other” sites/forges/hubs/labs.I know you are looking at building your v3 pages server and thought this might be useful it scales and is capable of a […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
December 4, 2025 at 11:03 PM
@dansup hello I registered on pixelfed.social about 5/6 days ago and verified my email address etc, but I haven’t had any confirmation my account has been approved (ric@sqcows.com) could you take a look please? 🙏
December 4, 2025 at 10:55 PM
🚀 Bovine Pages Server v0.1.1 is here!

New features for self-hosted static sites:

🔒 DNS TXT Verification - Prevent domain hijacking with cryptographic proof of ownership

🔀 Custom Domain Redirects - URL redirect system with .redirects file support, automatic Traefik middleware creation […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
December 4, 2025 at 7:44 PM
Ok folks #bovine the #forgejo #gitea static web pages server is almost ready for release. One more feature to build and test and this is to do some DNS validation to stop a bad actor registering domains in the pages router! a very early preview release can be found here […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
December 3, 2025 at 11:22 PM
Big updates for the #forgejo static website server built on #traefik, features now implemented:

✅ Static site hosting from public/ folders
✅ Automatic HTTPS with Let's Encrypt
✅ Custom domain support
✅ Password protection for private sites
✅ Directory index support (auto index.html)
✅ Redis […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
December 1, 2025 at 10:41 PM
Ok it’s not fully ready for release BUT big news for #selfhosted #forgejo. I’ve written a new plugin for #traefik that can serve static webpages direct from git! Like GitHub-pages but you can host yourself. It also supports SSL for custom domains (the bit I was battling with). Watch this page […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
November 29, 2025 at 1:29 PM
@geerlingguy are the geek pi folks on mastodon?
November 24, 2025 at 7:52 PM
Ok folks, I've just release v0.1.2 of the #forgejo #n8n community node for your testing. Pagination support and UX improvements are coming your way as well as 100% code coverage and tests! https://www.npmjs.com/package/n8n-nodes-forgejo
November 21, 2025 at 9:27 PM
Have I slipped into some kind of parallel universe or have the matrix reprogrammed? I swear I’ve never come across AAAA batteries before in my life triple and double a yes but this!!!!!
November 19, 2025 at 5:02 PM
I'm hoping to find some #selfhosted #n8n users here who also use the awesome #forgejo as I've written and I'm currently testing a new node for automating operations on a Forgejo instance. I could do with some help testing please […]

[Original post on mastodon.squarecows.com]
November 13, 2025 at 10:33 PM
Hey @geerlingguy I need some advice. I'm a linux guy but know very little about graphics cards, my zimaboard 2 has just arrived and I fancy adding some AI super powers to it. What GPU do i go for here? It would be nice to do some decent ollama models onthis thing. Any recomendations?
November 11, 2025 at 12:16 PM
@protonprivacy I wish you had api endpoints for your services so we could link up with automation tools like n8n and then if we could use lumo AI with it it would be amazing! #wishlist
November 10, 2025 at 12:20 PM
Hey I didn't see @mixpost had joined the fedi officially so a big welcome.
November 6, 2025 at 11:40 PM
Is it me or is this font slightly familiar? and both names starting with Z, my brain can't unlink these things.
November 5, 2025 at 10:50 PM
Just taught Claude #ai to spell in “British English” my work here is done.
November 4, 2025 at 12:22 PM
Hello wonderful #proton users, I've written. new product idea for the @protonprivacy folks for #zerotrust networking (a bit like cloudflared) so if you'd like to see it come vote for it please: https://protonmail.uservoice.com/forums/945460-general-ideas/suggestions/50648168-proton-zerotrust-gateway
Proton ZeroTrust Gateway
# Product Concept Proton Zero‑Trust Gateway ## Vision Proton already protects outbound traffic through its VPN, giving users privacy and security when they connect to the internet. The next logical step is to give them the same level of confidence for inbound connections—letting them expose services (websites, APIs, SSH, RDP, IoT endpoints, etc.) without ever having to open ports or configure complex NAT rules. A “Zero‑Trust Gateway” would sit at the edge of a user’s network, authenticate every request, enforce fine‑grained policies, and only forward traffic that meets those policies to the private host. ## Core Pillars - Identity‑First Access – Every inbound request must present a verifiable identity before any traffic reaches the user’s device. Integration with existing Proton accounts (including Proton Pass for MFA, Proton ID for SSO, and optional third‑party IdPs) ensures that only authorized users can connect. The gateway can also support short‑lived access tokens, QR‑code scans, or email‑based approvals for ad‑hoc sharing. - Encrypted Tunnel‑to‑Tunnel – Once a request is authenticated, the gateway establishes an end‑to‑end encrypted tunnel directly to the user’s Proton VPN client. From the perspective of the public internet, the service appears to be hosted behind Proton’s globally distributed edge nodes, while the actual payload travels over the same privacy‑preserving infrastructure used for outbound VPN traffic. - Policy Engine – Users define per‑service policies that combine: - Who (specific Proton users, groups, or external identities) - When (time‑bound windows, geofencing) - How (allowed methods, rate limits, logging requirements) The engine evaluates each request in real time, rejecting anything that falls outside the defined parameters. ## User Experience Flow - Publish a Service – From the Proton dashboard or mobile app, the user selects “Expose Service,” chooses a local port or container, and assigns a friendly sub‑domain under *.protongateway.io. They then attach an access policy (e.g., “Only my team members” or “Anyone with a one‑time link”). - Share the Endpoint – The generated URL can be shared directly, embedded in an invitation email, or turned into a QR code. If the policy requires approval, the recipient receives a secure request that they can approve with their Proton Pass MFA. - Connect Securely – When a remote client accesses the URL, the edge node authenticates the request, establishes the encrypted tunnel, and forwards traffic to the user’s device over the existing Proton VPN tunnel. To the remote client, the service feels like a normal HTTPS endpoint; to the user, no inbound ports are opened. ## Strategic Fit for Proton - Differentiation – While many VPN providers focus solely on outbound privacy, a Zero‑Trust Gateway positions Proton as a full‑stack privacy platform, covering both directions of traffic. - Synergy with Existing Products – Leverages Proton VPN’s global edge network, Proton Pass for MFA, and Proton Identity for SSO, creating cross‑product stickiness. - Enterprise Appeal – Remote teams, developers, and small businesses can expose internal tools (git servers, dashboards, dev environments) without compromising perimeter security—a clear value proposition for Proton ## Business and Proton Visionary plans. - Revenue Opportunity – Offer as part of Proton Plus/Professional tiers, with tiered limits on concurrent exposed services, bandwidth, and advanced policy features (e.g., geo‑blocking, custom TLS certificates). ## Potential Challenges & Mitigations - Performance Overhead – Adding an extra hop could increase latency. Mitigate by deploying edge nodes in key regions and using protocol‑level optimizations (QUIC, HTTP/3) for low‑latency paths. - Abuse Prevention – Open endpoints could be misused for illicit content. Enforce strict abuse monitoring, require verified Proton accounts for publishing, and provide rapid takedown mechanisms. - Complex Policy UI – Users unfamiliar with Zero‑Trust concepts might find policy creation daunting. Provide guided templates (“Team Only”, “Public Read‑Only”, “One‑Time Guest”) and contextual help within the dashboard.
protonmail.uservoice.com
October 30, 2025 at 11:27 AM
Super surprised to be on a flight carrying my clan name! Clan MacInnes!
October 10, 2025 at 5:49 PM
New wheels have arrived 😃
October 3, 2025 at 8:24 AM
@andycarolan I might have asked you this before but do you design 3d stuff also?
October 2, 2025 at 9:12 AM
September 30, 2025 at 8:37 PM
@andypiper I'm calling for the UK government to adopt the fediverse as it's showing a willingness to leave X. Can we talk about getting some exposure on this?
September 29, 2025 at 11:30 PM
Hello #makers I need something simple and some advice please. A device that picks up a wireless signal (lora,ble,WiFi,zigbee)/whatever and can simply do one thing turn on/off an LED maybe set it’s colour or make it flash, BUT it needs to be simple and cheep, really cheap as I might need 50 or so […]
Original post on mastodon.squarecows.com
mastodon.squarecows.com
September 24, 2025 at 8:25 PM