What you get
Everything a serious self-hoster needs
Three pillars of membership content, continuously updated and immediately downloadable.
Tutorials & Guides
Deep-dive technical tutorials covering AI automation pipelines, Kubernetes for solo developers, Linux hardening, self-hosted media servers, and cloud-native configuration patterns. New content released every week.
Encrypted Utilities
Downloadable software utilities designed for privacy-focused developers: encrypted note-taking CLIs, multi-device file manifest tools, password vault sync helpers, and command-line utilities for secure configuration management.
Cloud & Self-Hosted Configs
Production-ready Terraform modules, Ansible playbooks, and Docker Compose stacks for popular self-hosted applications. Each configuration is tested, documented, and includes an upgrade path — drop it into your infrastructure and go.
Member voices
Built for developers, privacy-focused users, and technology enthusiasts
"WEDC's configuration library cut our team's onboarding time in half. The Ansible playbooks are clean and idiomatic — we adapted them for our stack in an afternoon."
Marcus Hellström
Platform Engineer · Norrland Software AB
"I've been self-hosting for years, but WEDC keeps surfacing things I didn't know I needed. The encrypted utility tools alone are worth the subscription."
Priya Venkatesh
Independent Developer · Self-employed
"Finally a membership that speaks to people who actually run their own infrastructure. The Linux hardening guides are thorough, practical, and updated for 2026 tooling."
Tobias Grunewald
Systems Administrator · Grunewald IT Solutions
From the library
Recent articles
Setting Up a Self-Hosted Linux Home Lab in 2026
A practical, step-by-step guide to building your own home lab on commodity hardware — covering OS selection, network segmentation, and the essential self-hosted services every developer should run.
Read articleA Beginner's Guide to AI Automation with n8n
n8n is the open-source workflow automation platform that connects your APIs, databases, and AI models without writing a single line of glue code. This guide covers installation, your first workflow, and practical AI-powered automations.
Read articleHardening Your Self-Hosted Stack: 7 Practical Steps
Running services on your own hardware is liberating, but it shifts the security burden entirely onto you. These seven concrete steps dramatically reduce your attack surface without adding operational complexity.
Read articleReady to level up your stack?
Join 2,400+ developers and technology enthusiasts who rely on WEDC for weekly technical resources, configuration guides, and encrypted utility applications.
See membership plans