What you build
Infrastructure you control, which shoutouts describe as “not enterprise hosted,” “on my Pi,” or “always-on Mac Mini”:
- Edge or home deployment with stable power and networking.
- Secure ingress (for example reverse proxy or tunnel) if you need HTTPS endpoints for integrations.
- Local or regional models when latency, cost, or policy favors Ollama-style setups.
- Separation between “lab” and “family” or “work” networks when needed.
CoWork OS is built for teams that want ownership, not a black-box SaaS brain.
Why CoWork OS is a strong fit
- Open-source posture and GitHub-first transparency match “hackable install” expectations.
- Docs for self-hosting, security, and remote access (see self-hosting, remote access).
- BYOK and local storage align with “context lives on your computer” stories.
- Provider flexibility so you are not locked to one cloud AI vendor.
How to use
- Size the machine to your workload: triage chat vs heavy codegen.
- Harden SSH, firewall rules, and automatic security updates.
- Use secrets management appropriate to your threat model.
- Backup state and configs before you iterate recklessly.
- Document recovery: if the SD card dies, how do you rebuild?
Prerequisites
- Static or dynamic DNS if you expose services.
- Monitoring for disk, RAM, and thermal limits on small boards.
- Time to read security guide sections for exposure.
Steps
- Deploy internal-only first; prove stability.
- Add remote access with mutual TLS or VPN before public HTTP.
- Layer integrations one at a time; watch failure modes.
- Load-test memory with realistic concurrent sessions.
- Revisit quarterly: unused tunnels and keys are liabilities.
Suggested prompts
- “List attack surfaces introduced by this tunnel setup.”
- “What logs prove the service restarted cleanly?”
- “Propose a minimal backup that restores chat state.”
Launch readiness
- Restore drill completed from backup at least once.
- Alerts fire on disk full and process crash.
- You can explain the setup to a second person without hand-waving.
Common pitfalls
- Exposing admin ports to the public internet.
- Underpowered hardware for the model size you chose.
- Fragile SD cards on Pis without wear leveling or backups.
- Forgotten tunnel or DNS entries after experiments.