1 00:00:00,000 --> 00:00:04,360 Imagine hitting send on a simple email. Yeah, just a standard message and 2 00:00:04,360 --> 00:00:09,830 Instead of that satisfying digital whoosh you suddenly realize you have to build 3 00:00:09,830 --> 00:00:12,180 this massive heavily armed 4 00:00:12,180 --> 00:00:17,740 Constantly monitored digital fortress just to get that single message out the door. 5 00:00:17,740 --> 00:00:19,200 That sounds completely exhausting 6 00:00:19,200 --> 00:00:24,050 It really does but I mean for decades that was the harsh reality of running your 7 00:00:24,050 --> 00:00:25,320 own digital infrastructure 8 00:00:25,320 --> 00:00:29,260 Oh, absolutely. So today we are talking about taking back control of that 9 00:00:29,260 --> 00:00:29,960 infrastructure 10 00:00:30,000 --> 00:00:34,880 Yeah, and to do that we really need to recognize the supporter of this deep dive 11 00:00:34,880 --> 00:00:39,080 Which is safe server, right? Because taking back control is a big step exactly 12 00:00:39,080 --> 00:00:43,640 You know organizations constantly default to renting these incredibly expensive 13 00:00:43,640 --> 00:00:48,080 proprietary tools from mega vendors like Microsoft or Google 14 00:00:48,080 --> 00:00:51,540 Yeah, exactly for their daily communications mostly because building that fortress 15 00:00:51,540 --> 00:00:52,360 just seems too hard 16 00:00:52,360 --> 00:00:56,880 But safe server actually helps replace those massive systems with cost-effective 17 00:00:56,880 --> 00:00:58,640 open source solutions 18 00:00:58,640 --> 00:01:02,760 Which is so important today is especially when you're dealing with 19 00:01:02,760 --> 00:01:08,770 legal regulatory or compliance requirements things like strict email retention 20 00:01:08,770 --> 00:01:11,440 policies financial record audit trails or 21 00:01:11,440 --> 00:01:16,080 You know rigorous data protection data sovereignty becomes totally non-negotiable 22 00:01:16,080 --> 00:01:17,480 there, right? 23 00:01:17,480 --> 00:01:21,620 You need to know exactly where your data lives and frankly who holds the keys to it 24 00:01:21,620 --> 00:01:26,020 So safe server guides organizations through that entire process from the very 25 00:01:26,020 --> 00:01:28,240 beginning from the initial consulting phase 26 00:01:28,240 --> 00:01:32,640 Yeah to finding the exact right open source software fit right through to actually 27 00:01:32,640 --> 00:01:35,600 operating your systems on highly secure German servers 28 00:01:35,600 --> 00:01:37,980 You can explore all those possibilities at 29 00:01:37,980 --> 00:01:40,680 www.safeserver.de 30 00:01:40,680 --> 00:01:45,110 Well taking back that control usually starts with understanding the tools you're 31 00:01:45,110 --> 00:01:45,840 actually using 32 00:01:45,840 --> 00:01:48,960 I mean most of us interact with email every single day 33 00:01:48,960 --> 00:01:52,380 But we treat it like a total black box the underlying mechanics are just you know 34 00:01:52,380 --> 00:01:53,520 completely hidden from view 35 00:01:53,520 --> 00:01:57,920 Well, we are opening up the hood on that black box today. We're looking at a really 36 00:01:57,920 --> 00:02:00,720 fascinating piece of the Internet's invisible plumbing 37 00:02:00,720 --> 00:02:04,860 Oh, yeah, the Dima project exactly. We're diving into a github repository 38 00:02:04,860 --> 00:02:10,330 For a project called Dima which stands for the dragonfly mail agent and the 39 00:02:10,330 --> 00:02:11,320 documentation 40 00:02:11,320 --> 00:02:17,400 Really positions this software as a very beginner friendly entry point into open 41 00:02:17,400 --> 00:02:18,640 source infrastructure 42 00:02:18,640 --> 00:02:23,140 Which is rare in this space. It really is it's designed specifically for home and 43 00:02:23,140 --> 00:02:23,820 office use 44 00:02:23,820 --> 00:02:28,360 It basically strips away the massive walls of code that usually intimidate people 45 00:02:28,360 --> 00:02:30,080 when they hear words like, you know 46 00:02:30,080 --> 00:02:34,930 Mail server right because the first barrier to entry in this space is almost always 47 00:02:34,930 --> 00:02:36,480 the terminology. Oh for sure 48 00:02:36,480 --> 00:02:40,890 It's alphabet soup. Yeah, the documentation relies on this very specific sort of 49 00:02:40,890 --> 00:02:44,280 historical division of labor in email architecture 50 00:02:44,280 --> 00:02:49,970 It separates the whole process into MTAs and MUAs. Okay, so the source defines DMA 51 00:02:49,970 --> 00:02:51,800 as a small mail transport 52 00:02:51,800 --> 00:02:57,560 Agent or MTA and its designated job is to accept mail from a locally installed mail 53 00:02:57,560 --> 00:02:58,820 user agent 54 00:02:58,820 --> 00:03:02,990 That's the MUA right the MUA and then deliver it either locally or to a remote 55 00:03:02,990 --> 00:03:03,160 destination 56 00:03:03,160 --> 00:03:06,540 Let's let's try to ground that in the physical space for a second 57 00:03:06,540 --> 00:03:08,120 I think an analogy would definitely help here 58 00:03:08,120 --> 00:03:12,000 So think of the MUA as the person sitting at their desk, right? 59 00:03:12,160 --> 00:03:15,730 They're writing a letter putting it in an envelope and actually writing the address 60 00:03:15,730 --> 00:03:16,320 on the front 61 00:03:16,320 --> 00:03:20,720 So that's your outlook your Apple Mail your Thunderbird interface exactly and the MTA 62 00:03:20,720 --> 00:03:23,900 the mail transport agent is basically the mailroom down the hall 63 00:03:23,900 --> 00:03:28,300 It takes that sealed envelope from you figures out the logistics and literally 64 00:03:28,300 --> 00:03:30,400 loads it onto a truck to leave the building 65 00:03:30,400 --> 00:03:36,440 The mailroom analogy works conceptually, but I'd add one major caveat there 66 00:03:36,440 --> 00:03:41,910 What say this digital mailroom never sleeps it handles thousands of envelopes a 67 00:03:41,910 --> 00:03:44,360 second and the roads it drives on are basically 68 00:03:44,360 --> 00:03:48,760 Constantly collapsing. Oh meaning network outages precisely if we look at why this 69 00:03:48,760 --> 00:03:51,200 division of labor even exists 70 00:03:51,200 --> 00:03:54,920 It comes down to asynchronous processing. Okay unpack that a bit 71 00:03:54,920 --> 00:03:59,840 Well, if your desktop mail program your MUA had to handle the actual physical 72 00:03:59,840 --> 00:04:03,080 delivery of every single email across the global internet 73 00:04:03,440 --> 00:04:07,010 Your entire workflow would just grind to a halt because it's waiting on the other 74 00:04:07,010 --> 00:04:07,820 end, right? 75 00:04:07,820 --> 00:04:12,580 Imagine hitting send but the receiving server in Tokyo happens to be temporarily 76 00:04:12,580 --> 00:04:16,600 down or a router in the Midwest drops a packet 77 00:04:16,600 --> 00:04:18,600 You just that program would just freeze 78 00:04:18,600 --> 00:04:21,080 Exactly, you'd be staring at a spinning wheel 79 00:04:21,080 --> 00:04:24,660 Completely locked out of your inbox while the software repeatedly tries to 80 00:04:24,660 --> 00:04:26,000 establish a connection 81 00:04:26,000 --> 00:04:29,660 So the local software the MUA just hands the envelope to the mailroom and 82 00:04:29,660 --> 00:04:31,000 immediately walks away 83 00:04:31,000 --> 00:04:35,090 Yeah, the user gets to keep typing the next email while the MTA takes on the whole 84 00:04:35,090 --> 00:04:36,280 burden of waiting in line 85 00:04:36,280 --> 00:04:40,920 The MTA takes on the entire burden of network latency and failure states 86 00:04:40,920 --> 00:04:46,400 It cues the message it initiates all the complex digital handshakes with remote 87 00:04:46,400 --> 00:04:46,840 servers 88 00:04:46,840 --> 00:04:50,850 And if a connection fails it schedules a retry for 10 minutes later or maybe an 89 00:04:50,850 --> 00:04:51,320 hour later 90 00:04:51,320 --> 00:04:56,200 By focusing purely on that logistical transport side Dima acts as a highly 91 00:04:56,200 --> 00:04:56,600 specialized 92 00:04:57,400 --> 00:05:01,180 Incredibly lightweight courier right doesn't care about the font you used no not at 93 00:05:01,180 --> 00:05:01,440 all 94 00:05:01,440 --> 00:05:05,220 It strips out anything related to formatting text managing address books or 95 00:05:05,220 --> 00:05:06,400 organizing folders 96 00:05:06,400 --> 00:05:10,800 It handles routing and delivery full stop and that brings up a really fascinating 97 00:05:10,800 --> 00:05:11,420 limitation 98 00:05:11,420 --> 00:05:16,480 Detailed right there in the project's own github read me the disclaimer 99 00:05:16,480 --> 00:05:22,240 Yeah, they state explicitly that Dima is not intended as a replacement for 100 00:05:22,880 --> 00:05:28,880 Real big MTAs like send mail or postfix which is refreshing honesty 101 00:05:28,880 --> 00:05:32,740 It is and they highlight a very specific technical boundary 102 00:05:32,740 --> 00:05:37,460 Dina does not listen on port 25 for incoming connections, right? 103 00:05:37,460 --> 00:05:42,070 And just for context port 25 is the standard entry point for incoming email traffic 104 00:05:42,070 --> 00:05:43,720 across the global internet 105 00:05:43,720 --> 00:05:47,840 It's the front door exactly when a server wants to hand an email to another server 106 00:05:47,840 --> 00:05:52,350 It basically knocks on port 25, but wait if this software intentionally ignores 107 00:05:52,350 --> 00:05:54,780 incoming connections on the main email port 108 00:05:54,780 --> 00:05:57,680 It sounds like we're building half a bridge here. How do you mean? 109 00:05:57,680 --> 00:06:02,680 Well, a mail tool for a home or office seems fundamentally broken if it explicitly 110 00:06:02,680 --> 00:06:06,200 Refuses to receive mail from the outside world. Why would you want that? 111 00:06:06,200 --> 00:06:09,620 You really have to view this through the lens of modern internet security. The 112 00:06:09,620 --> 00:06:11,440 internet is exceptionally noisy 113 00:06:11,440 --> 00:06:13,960 I mean it is saturated with automated botnets 114 00:06:14,640 --> 00:06:18,620 Constantly scanning every single IP address in existence. Just looking for open 115 00:06:18,620 --> 00:06:19,360 doors, right? 116 00:06:19,360 --> 00:06:24,730 opening port 25 on a server is basically the equivalent of hanging a giant neon 117 00:06:24,730 --> 00:06:26,680 sign outside your house that says I 118 00:06:26,680 --> 00:06:31,760 Accept anonymous packages. Oh, wow. Yeah, there are IT veterans who still wake up 119 00:06:31,760 --> 00:06:33,900 in cold sweats. Remembering the early days of 120 00:06:33,900 --> 00:06:39,720 Server hosting, you know the open relay days. Yes, you'd accidentally leave port 25 121 00:06:39,720 --> 00:06:40,080 open 122 00:06:40,600 --> 00:06:44,440 Disconfigure one tiny setting and you'd come back from lunch to find your server 123 00:06:44,440 --> 00:06:46,560 had been completely hijacked by a botnet 124 00:06:46,560 --> 00:06:50,340 Just blasting out emails. Yeah, it just emailed half of Europe a massive spam 125 00:06:50,340 --> 00:06:52,200 campaign for prescription pills 126 00:06:52,200 --> 00:06:57,670 That is the exact nightmare scenario within minutes of opening port 25 automated 127 00:06:57,670 --> 00:07:00,260 scripts will probe your server looking for an open relay 128 00:07:00,260 --> 00:07:04,300 They just want to use your resources. Exactly. They want to exploit your hardware 129 00:07:04,300 --> 00:07:06,520 to blast out spam while masking their own identity 130 00:07:07,280 --> 00:07:10,700 Defending against that requires a heavily fortified infrastructure, which Dima is 131 00:07:10,700 --> 00:07:13,720 not no not at all to defend port 25 132 00:07:13,720 --> 00:07:19,190 You need complex configuration files real-time spam filtering IP reputation 133 00:07:19,190 --> 00:07:21,920 management constant monitoring all the heavy lifting 134 00:07:21,920 --> 00:07:26,860 Right. That is the job of a real big MTA like send mail or postfix 135 00:07:26,860 --> 00:07:30,280 They are designed to stand on the front lines and fight off those botnets 136 00:07:30,280 --> 00:07:35,030 So removing the doorbell entirely is the actual security strategy here exactly by 137 00:07:35,030 --> 00:07:36,800 not listening on port 25 138 00:07:36,960 --> 00:07:40,000 D may simply removes the attack sector 139 00:07:40,000 --> 00:07:44,440 It cannot be targeted by external spam or automated open relay attacks 140 00:07:44,440 --> 00:07:48,440 Because it literally just refuses to acknowledge anyone knocking from the outside 141 00:07:48,440 --> 00:07:53,240 It acts as a quiet outbound only workhorse for your local network, but who only 142 00:07:53,240 --> 00:07:54,440 needs outbound mail 143 00:07:54,440 --> 00:07:58,840 You'd be surprised a massive amount of infrastructure requires outbound email 144 00:07:58,840 --> 00:08:02,000 without ever needing to receive it like what think about it 145 00:08:02,000 --> 00:08:07,260 Your backup server needs to email you a success log at 2 a.m. Your internal web 146 00:08:07,260 --> 00:08:09,640 application needs to send a password reset link to a user 147 00:08:09,640 --> 00:08:14,040 Right or an alert exactly a temperature sensor and a server closet needs to fire 148 00:08:14,040 --> 00:08:15,000 off an emergency alert 149 00:08:15,000 --> 00:08:18,600 None of those systems ever need to receive replies that makes total sense 150 00:08:18,600 --> 00:08:23,660 So Dima takes the mail generated by those local machines and securely delivers it 151 00:08:23,660 --> 00:08:24,520 out to the world 152 00:08:24,520 --> 00:08:30,210 Completely bypassing the massive configuration overhead required to defend a public-facing 153 00:08:30,210 --> 00:08:30,560 inbox 154 00:08:30,640 --> 00:08:36,480 Okay, so knowing that it's an outbound only courier operating behind closed doors 155 00:08:36,480 --> 00:08:40,600 We need to look at the mechanism of how it actually hands that mail off to the rest 156 00:08:40,600 --> 00:08:42,520 of the world security and transit 157 00:08:42,520 --> 00:08:46,120 Right because the internet doesn't give you a free pass on modern encryption 158 00:08:46,120 --> 00:08:50,520 Just because your software footprint is small if you are transmitting passwords or 159 00:08:50,520 --> 00:08:51,660 sensitive server alerts 160 00:08:51,660 --> 00:08:56,590 The data must be secure in transit and balancing a tiny software footprint with the 161 00:08:56,590 --> 00:08:59,440 mathematical density of modern encryption is a massive 162 00:09:00,000 --> 00:09:04,400 Engineering challenge. Well, the repository files outlined exactly how Dima handles 163 00:09:04,400 --> 00:09:07,740 this the documentation specifically highlights TLS 164 00:09:07,740 --> 00:09:12,880 And SSL support along with SMTP authentication, which is standard modern security 165 00:09:12,880 --> 00:09:15,080 Yeah, and we can see the proof in the source code files 166 00:09:15,080 --> 00:09:19,560 You know names like crypto dot C base sixty four dot C and off dot conv 167 00:09:19,560 --> 00:09:24,200 But the language breakdown in the repositories of what really caught my eye here 168 00:09:24,200 --> 00:09:25,040 the C code 169 00:09:25,040 --> 00:09:29,260 Yeah, the project is overwhelmingly written in the C programming language 170 00:09:29,260 --> 00:09:33,660 Yeah, it sits at about eighty seven point five percent C with a total of four 171 00:09:33,660 --> 00:09:35,280 hundred and eighty seven commits 172 00:09:35,280 --> 00:09:39,720 That's the number of times developers have updated the code over its lifespan 173 00:09:39,720 --> 00:09:42,740 C is the foundational language of modern operating systems 174 00:09:42,740 --> 00:09:47,480 But it's powerful, but it places the entire burden of memory management on the 175 00:09:47,480 --> 00:09:48,520 human writing the code 176 00:09:48,520 --> 00:09:51,940 Okay, if you're listening to this and thinking why do I care about a decades-old 177 00:09:51,940 --> 00:09:53,280 coding language? 178 00:09:53,280 --> 00:09:57,720 hang with us for a second because this is where the vulnerability of 179 00:09:58,640 --> 00:10:02,820 Early software hits your daily life. It really does because C requires developers 180 00:10:02,820 --> 00:10:05,720 to manually allocate and free up computer memory, right? 181 00:10:05,720 --> 00:10:10,650 Yes, one microscopic Tyco like one forgotten line of code to clear a memory block 182 00:10:10,650 --> 00:10:13,240 and a malicious actor can overflow that memory 183 00:10:13,240 --> 00:10:17,170 To inject their own code completely compromising the server. It happens all the 184 00:10:17,170 --> 00:10:18,240 time in poorly written C 185 00:10:18,240 --> 00:10:23,710 So how does a small home and office tool safely manage complex modern encryption 186 00:10:23,710 --> 00:10:26,200 like TLS transport layer security? 187 00:10:26,440 --> 00:10:30,900 Using a language notorious for manual memory errors in just a handful of files 188 00:10:30,900 --> 00:10:35,530 The answer there really lies in the architecture of the code base and the principle 189 00:10:35,530 --> 00:10:37,300 of modularity modularity 190 00:10:37,300 --> 00:10:37,600 Yeah 191 00:10:37,600 --> 00:10:42,020 if you look at the file list you've got crypto dot C and base 64 dot C sitting 192 00:10:42,020 --> 00:10:44,700 right alongside net dot C for networking and 193 00:10:44,700 --> 00:10:48,220 Mail dot C for routing logic. Okay, so it's broken up 194 00:10:48,220 --> 00:10:52,970 Exactly and crucially Dema does not attempt to invent its own encryption algorithms 195 00:10:52,970 --> 00:10:55,120 from scratch, which would be a bad idea 196 00:10:55,120 --> 00:10:59,520 Oh writing custom cryptography and C is universally considered a terrible idea by 197 00:10:59,520 --> 00:11:01,740 security professionals. Leave it to the experts 198 00:11:01,740 --> 00:11:06,720 Yeah, right instead Dema's C code acts as a highly efficient bridge 199 00:11:06,720 --> 00:11:11,120 It interfaces directly with the existing battle tested security libraries already 200 00:11:11,120 --> 00:11:13,880 installed in your operating system like open SSL 201 00:11:13,880 --> 00:11:17,890 Ah, so it's like a small storefront that doesn't try to build its own bank vault 202 00:11:17,890 --> 00:11:18,680 out of plywood 203 00:11:18,680 --> 00:11:23,420 I like that analogy. It just builds a secure pneumatic tube that routes the 204 00:11:23,420 --> 00:11:24,700 transactions to the massive 205 00:11:25,520 --> 00:11:30,080 Impenetrable bank vault next door. That's exactly it. The code footprint stays 206 00:11:30,080 --> 00:11:34,260 Incredibly lean because it offloads all the heavy mathematical lifting to the 207 00:11:34,260 --> 00:11:35,560 system, which is smart 208 00:11:35,560 --> 00:11:39,360 It is and this leanness is actually its greatest security asset 209 00:11:39,360 --> 00:11:44,220 When you only have a handful of C files doing very specific tasks the code becomes 210 00:11:44,220 --> 00:11:45,720 auditable, right? 211 00:11:45,720 --> 00:11:47,720 You mentioned it has 487 commits 212 00:11:47,720 --> 00:11:52,120 Yeah, a dedicated developer could easily read through the entirety of Dimas code 213 00:11:52,120 --> 00:11:53,240 base over a weekend 214 00:11:53,400 --> 00:11:57,040 They can trace exactly how data flows from the local spool 215 00:11:57,040 --> 00:12:01,620 Which is essentially the digital outbox waiting area on your machine right out to 216 00:12:01,620 --> 00:12:03,640 the network. Where's a larger program? 217 00:12:03,640 --> 00:12:08,700 Oh auditing a legacy behemoth like sendmail with its labyrinth of configuration macros 218 00:12:08,700 --> 00:12:10,840 and literally thousands of source files 219 00:12:10,840 --> 00:12:14,120 That can take teams of experts months 220 00:12:14,120 --> 00:12:14,360 Yeah 221 00:12:14,360 --> 00:12:18,280 You can't hide a malicious backdoor or a glaring memory leak in a 10 page document 222 00:12:18,280 --> 00:12:20,340 as easily as you can bury it in a 223 00:12:20,400 --> 00:12:24,980 10,000 page manual the simplicity ensures that your home or office server can 224 00:12:24,980 --> 00:12:27,780 securely authenticate with remote destinations 225 00:12:27,780 --> 00:12:32,200 Proving who you are to Google or safe server or wherever you're routing the mail 226 00:12:32,200 --> 00:12:35,920 without bloating your local system with unnecessary code 227 00:12:35,920 --> 00:12:39,640 It is a textbook application of the UNIX philosophy 228 00:12:39,640 --> 00:12:44,430 Which is write small programs that do one thing do it exceptionally well and make 229 00:12:44,430 --> 00:12:45,960 sure they can talk to other programs 230 00:12:45,960 --> 00:12:48,080 Love that. Okay. So the code is 231 00:12:48,640 --> 00:12:50,580 lean and auditable 232 00:12:50,580 --> 00:12:56,050 But source code doesn't send emails running software does true and historically 233 00:12:56,050 --> 00:12:56,800 turning raw 234 00:12:56,800 --> 00:13:01,540 C-code into a running application was a brutal barrier to entry for anyone trying 235 00:13:01,540 --> 00:13:03,640 to self-host their own infrastructure 236 00:13:03,640 --> 00:13:04,840 Oh, it was a nightmare 237 00:13:04,840 --> 00:13:08,410 You have to download the raw text files ensure you had the correct compilers 238 00:13:08,410 --> 00:13:10,220 installed decipher complex 239 00:13:10,220 --> 00:13:13,490 prerequisite libraries just reading that hurts my brain and then you'd run the 240 00:13:13,490 --> 00:13:16,760 build process basically just praying it didn't terminate with a 241 00:13:16,760 --> 00:13:21,160 Cryptic error online 4000. Well the building section of the DMA readme actually 242 00:13:21,160 --> 00:13:22,940 still contains those old-school instructions 243 00:13:22,940 --> 00:13:28,090 Oh, it does. Yeah, it outlines the process of compiling, you know using a program 244 00:13:28,090 --> 00:13:28,300 to 245 00:13:28,300 --> 00:13:33,890 Translate human readable C code into the binary machine instructions your computer 246 00:13:33,890 --> 00:13:36,420 processor actually understands right the make commands 247 00:13:36,420 --> 00:13:40,100 Yeah for Linux it tells you to type make for BSD systems 248 00:13:40,100 --> 00:13:45,570 It's CD BSD and then make and then the installation. Oh man, then comes the 249 00:13:45,570 --> 00:13:46,300 installation command 250 00:13:46,300 --> 00:13:51,090 It's like make install it send mail link mail clink install spool deers install it. 251 00:13:51,090 --> 00:13:51,740 Etc. It's a lot 252 00:13:51,740 --> 00:13:53,740 It looks like an ancient incantation 253 00:13:53,740 --> 00:13:58,040 You are manually telling the computer where to put the executable files 254 00:13:58,040 --> 00:14:02,780 How to link them and exactly where to create the spool directories and the problem 255 00:14:02,780 --> 00:14:02,940 is 256 00:14:02,940 --> 00:14:08,160 One incorrect permission setting on just one of those directories and the entire 257 00:14:08,160 --> 00:14:10,180 mail agent fail silently 258 00:14:10,180 --> 00:14:13,980 Just dead in the water. Yeah, but and this is the best part the documentation 259 00:14:13,980 --> 00:14:16,140 highlights a massive shift 260 00:14:16,300 --> 00:14:19,280 In how we deploy this kind of software today. Thank goodness 261 00:14:19,280 --> 00:14:21,980 Yeah, you don't actually have to type any of those make commands anymore. I'll 262 00:14:21,980 --> 00:14:22,700 package managers 263 00:14:22,700 --> 00:14:27,500 Exactly. The project lists the exact simple commands used by modern package 264 00:14:27,500 --> 00:14:28,140 managers 265 00:14:28,140 --> 00:14:33,840 So on freebsd you open your terminal and type pkg install dima on ubuntu 266 00:14:33,840 --> 00:14:38,060 Which is arguably the most popular distribution for home servers 267 00:14:38,060 --> 00:14:44,540 It's just sudo apt install dima and arch linux arch users type yard digest dimar 268 00:14:44,620 --> 00:14:48,560 It's amazing a single command line execution basically replaces an hour of manual 269 00:14:48,560 --> 00:14:50,460 compiling and directory configuration 270 00:14:50,460 --> 00:14:54,060 The contrast is staggering for anyone who's intimidated by server administration 271 00:14:54,060 --> 00:14:57,760 I mean instead of reading a sprawling manual to compile source code you type three 272 00:14:57,760 --> 00:15:00,380 words hit enter and in about five seconds 273 00:15:00,380 --> 00:15:04,860 A fully functioning secure mail transport agent is actively running on your machine 274 00:15:04,860 --> 00:15:08,900 This is exactly where we see the invisible labor of the open source community at 275 00:15:08,900 --> 00:15:09,820 work. How so? 276 00:15:09,820 --> 00:15:13,650 Well the repository statistics you mentioned earlier hold the key to this ease of 277 00:15:13,650 --> 00:15:13,900 use 278 00:15:13,980 --> 00:15:18,110 All right, so it has 255 stars and 54 forks which indicates active interest and 279 00:15:18,110 --> 00:15:20,140 experimentation from other developers 280 00:15:20,140 --> 00:15:26,340 But more importantly it lists 34 direct contributors. Those 34 contributors are the 281 00:15:26,340 --> 00:15:26,860 bridge 282 00:15:26,860 --> 00:15:31,710 They're the bridge between the complex c code and that simple apt install command. 283 00:15:31,710 --> 00:15:33,740 They're the package maintainers exactly 284 00:15:33,740 --> 00:15:37,260 They took the original developer's code. They ran those complex make commands 285 00:15:37,260 --> 00:15:41,660 Figured out exactly which directories the files need to live in for uber 2 286 00:15:42,140 --> 00:15:47,120 Configured all the exact security permissions required and bundled it all into a 287 00:15:47,120 --> 00:15:49,100 neat downloadable package 288 00:15:49,100 --> 00:15:52,140 So they absorb the friction. Yes, they absorbed all the friction 289 00:15:52,140 --> 00:15:54,060 So the end user doesn't have to deal with it 290 00:15:54,060 --> 00:15:58,620 And honestly their labor is exactly why duma is prominently featured on the awesome 291 00:15:58,620 --> 00:16:00,620 self-hosted list. That's a great list 292 00:16:00,620 --> 00:16:05,420 It is for those who don't know that list is a highly curated directory of software 293 00:16:06,120 --> 00:16:10,620 Specifically chosen because it respects user privacy and allows individuals to 294 00:16:10,620 --> 00:16:13,020 reliably run their own digital lives 295 00:16:13,020 --> 00:16:17,060 And software does not make that list if it requires a computer science degree just 296 00:16:17,060 --> 00:16:17,740 to keep it running 297 00:16:17,740 --> 00:16:22,140 Definitely not being included means duma is trusted by a community that really 298 00:16:22,140 --> 00:16:25,420 prioritizes self-reliance and stability. It democratizes 299 00:16:25,420 --> 00:16:30,890 Infrastructure, you know, you no longer need a dedicated it department to handle 300 00:16:30,890 --> 00:16:32,460 your internal server routing 301 00:16:33,100 --> 00:16:37,620 The barrier to entry has essentially vanished and lowering that barrier 302 00:16:37,620 --> 00:16:42,670 Fundamentally changes the strategic calculation for organizations of all sizes. 303 00:16:42,670 --> 00:16:46,280 Absolutely if setting up specialized infrastructure is this accessible 304 00:16:46,280 --> 00:16:48,420 relying on 305 00:16:48,420 --> 00:16:49,760 bloated 306 00:16:49,760 --> 00:16:53,900 Proprietary ecosystems is no longer a mandatory cost of doing business 307 00:16:53,900 --> 00:16:58,180 Which you know really brings us back to the core mission of safe server, right? 308 00:16:58,180 --> 00:17:01,820 Because when the technical friction disappears, you can make decisions based on 309 00:17:01,820 --> 00:17:05,180 your actual needs rather than just technological lock-in exactly 310 00:17:05,180 --> 00:17:10,140 So a growing business a non-profit association or really any group managing their 311 00:17:10,140 --> 00:17:10,440 own data 312 00:17:10,440 --> 00:17:14,970 Might just need a lightweight tool like Dima to quietly handle internal server 313 00:17:14,970 --> 00:17:17,180 alerts where they might need something bigger, right? 314 00:17:17,180 --> 00:17:20,820 They might need a comprehensive open source alternative to replace their entire 315 00:17:21,380 --> 00:17:25,780 Expensive proprietary email suite across a hundred employees. Yeah, but in both 316 00:17:25,780 --> 00:17:28,420 scenarios, the cost-saving potential is immense 317 00:17:28,420 --> 00:17:34,110 You're not trapped. No, you do not have to pay per user per month licensing fees to 318 00:17:34,110 --> 00:17:35,180 tech conglomerates 319 00:17:35,180 --> 00:17:39,650 Just to route internal communications and more importantly you maintain total 320 00:17:39,650 --> 00:17:41,180 sovereignty over your data 321 00:17:41,180 --> 00:17:45,360 Which is critical but transitioning away from those massive vendors can still feel 322 00:17:45,360 --> 00:17:45,820 daunting 323 00:17:45,820 --> 00:17:49,480 Which is exactly why safe server can be commissioned for consulting 324 00:17:49,620 --> 00:17:54,020 They assess your specific operational needs and help you find and implement the 325 00:17:54,020 --> 00:17:55,640 right open source architecture 326 00:17:55,640 --> 00:17:59,580 Whether it's an intricate setup for a massive enterprise or just a simpler 327 00:17:59,580 --> 00:18:01,060 alternative for a small team 328 00:18:01,060 --> 00:18:05,460 Exactly. They ensure the solution fits and they can even host it on secure German 329 00:18:05,460 --> 00:18:05,740 servers 330 00:18:05,740 --> 00:18:09,260 You can explore those consulting and hosting options over at 331 00:18:09,260 --> 00:18:11,740 www.safeserver.de 332 00:18:11,740 --> 00:18:15,650 You know understanding the mechanics of a tool like daemma reveals a really 333 00:18:15,650 --> 00:18:19,500 important lesson. What's that? Enterprise grade reliability doesn't always require 334 00:18:19,620 --> 00:18:24,020 Enterprise grade bloat that is so true. We live in an ecosystem where technology 335 00:18:24,020 --> 00:18:26,060 companies are constantly pushing to add more 336 00:18:26,060 --> 00:18:31,100 every simple application on your phone suddenly demands to be an AI assistant a 337 00:18:31,100 --> 00:18:35,840 Social network and a data harvesting platform all simultaneously bloatware and 338 00:18:35,840 --> 00:18:39,440 feature creep have basically become the default state of the modern Internet 339 00:18:39,440 --> 00:18:43,820 They really have yet. Here is this tiny collection of C files net dot C 340 00:18:43,940 --> 00:18:48,770 Crypto dot C mail dot C that securely routes encrypted communications across the 341 00:18:48,770 --> 00:18:50,080 globe explicitly 342 00:18:50,080 --> 00:18:54,720 Refuses to do anything else and quietly gets out of your way the second its job is 343 00:18:54,720 --> 00:18:56,300 done. It's elegant 344 00:18:56,300 --> 00:18:58,180 It is so ask yourself 345 00:18:58,180 --> 00:19:02,580 Where else in your digital life might you benefit from replacing a bloated tracking 346 00:19:02,580 --> 00:19:04,700 heavy behemoth with a specialized simple tool? 347 00:19:04,700 --> 00:19:06,980 That just does its job and leaves you alone