portfolio · v3 · 2026

Self-Hosted. Independent. Relentless. 

No cloud dependency. No half-measures. Rented servers, custom configuration, full control — stable, transparent, and measurable.

01 · synopsis

About

A short read on the operator behind the boxes.

bio.txt

Ariazonaa, 19 years old, from Germany, is deeply engaged in systems and infrastructure engineering. His motivation has never been the mere use of technology, but a complete understanding of how it works — even if that means taking systems apart and analyzing them independently.

Rather than consuming abstract cloud services, he operates dedicated hardware. Instead of managing black-box systems, he configures, secures, and monitors every component himself.

It is not just about making systems function. It is about control, traceability, and technical responsibility — from the operating system down to the final line of configuration.

0
years · operator

Functionality is expected. Transparency is required.

DE
based · germany
since 2018
fully self-hosted infrastructure

02 · stack

Technologies

The tools that run when nobody is watching.

Linux
Debian
os · base layer
Proxmox VE
KVM + LXC
hypervisor
Docker
containers
runtime
Portainer
orchestration UI
control plane
Nginx
tls + routing
reverse proxy
Cloudflare
dns + waf
edge layer
Git
scm
version control
PostgreSQL
/ MySQL
primary store
Redis
in-memory kv
cache · queue
WireGuard
kernel · udp
vpn · tunnel
Fail2Ban
log scan
brute-force shield
Let’s Encrypt
certbot · acme
tls automation
Grafana
+ prometheus
observability

03 · approach

Philosophy

Three rules. Non-negotiable.

01

Stability by Design, Not by Recovery.

Backups are essential, but my primary goal is to never need them. I design systems to be robust and fault-tolerant from the outset, rather than just relying on a contingency plan.

02

Complexity is the Enemy of Security.

Every additional piece of software, every unnecessary line of configuration, is a potential vulnerability. My setups are radically minimalist to reduce the attack surface and maximize control.

03

Security is a Continuous Process, Not a State.

I don't rely on a one-time setup. My systems are continuously hardened, logs are actively monitored, and firewalls are restrictively configured to proactively defend against threats instead of just reacting to them.

04 · channels

Contact

Pick a transport. Click any line to copy.

~/contact — zsh — 80×24