Internet censorship, the solution – Your own personal web server

Google has done it for years, so have Facebook, and now Twitter has joined in. Most Social Media websites, use “artificial intelligence”, to prevent things, they for some reasons don’t want you to read. Don’t believe me, try posting something that has been labeled “fake news” by the establishment on Facebook, and PM your friends, and ask how many of them can see it in their news feed – Without physically visiting your own personal wall.

This way, “non wanted links” will simply never show up, creating a walled garden of lol-cat paradise, where nothing of actual importance, can ever possibly be debated. Of course, the parameters for the algorithms, that “eliminates unwanted information”, is controlled by a few “good men”, as always. Few things have actually changed since the inauguration of Hitler and Goebbels, and my grandfather had to hide his radio in the basement from the Nazis. Or since Plato wrote about the cave allegory for that matter …

I don’t care what side you’re one. To be honest, I couldn’t care less about “the left” versus “the right”. However, unless you can somehow communicate with each other, one way or another, radicalisation of both sides are inevitable. And both sides have an equal right to exercise their 1st Amendment rights.

Instead of bitching (too much) about it though, I’ve decided to do what I can about it. Which is to obliterate the control these social media websites have on the world, by simply commoditising their filet mignon; The ability to publish and communicate with your peers! Check out my goods so far in the video below. Next on my list, is file sharing, for then to create some sort of publishing system. Want to help me? Send me an email.

Below is a tutorial-style type of video, that demonstrates how to setup your own server, using an old laptop, in less than 30 minutes.

And here you can check out the details of the recipe. And below you can see what’s at stake …

Imagining 8 billion web servers

Did you know, that there’s probably at least 8 billion web servers in the world today? Or rather, to be more specific, there are at least 8 billion old laptops, that could easily be recycled, and turned into web servers. I should know, because I’ve got at least a handful of these laying around myself. And you do too probably. Most people tend to think about these old laptops as dead things, that they should have thrown away a long time ago, since they crashed due to some freakin’ Windows virus or something. Not realising, if they installed Linux on it, it would basically become a state of the art web server. Basically, a nuclear winter survivable, military grade, cryptographically locked down, super-duper safe home cloud, and web server! And the price for doing this? Zero dollars, and half an hour of your time!

In my previous blog, I showed you how I took one of my old laptops, and converted it into a home web server, and personal cloud, in 30 minutes, making me able to access my own personal PGP based encrypted webmail client, securely, from anywhere in the world I might decide to go.

I’ve even created a script, that does most of the heavy lifting. Which implies, that if you’re smart enough to install Ubuntu Server, which basically everybody is, you’re smart enough to create your own personal home web server, and cloud system, from where you can have all your local files, and/or emails, cryptographically secured, in the same type of system configuration, that the MI6, CIA, the NSA and WikiLeaks are using. Basically, a bullet proof cryptographically secured email solution, that you can access from anywhere you are in this world, on every device you own!

Imagine how the world would look like if everybody took out there old laptops from their closets, wiped the dust away, and ran my script. Would that be a better world …?

Setup your own LAMP-5 Home Web Server Cloud in 30 minutes

Free your Power with LAMP-5!

In the video below, I am demonstrating how you can easily setup your own LAMP-5 home web server home cloud, in 30 minutes. Basically, it requires setting up a Ubuntu Server, on for instance a VirtualBox, for then to to download a simple script, which does the heavy lifting for you.

If you don’t wish to use VirtualBox, feel free to find an old laptop, and convert it into a dedicated Ubuntu Server, which is what I have done. In fact, this is probably both safer, more secure, and less hassle – Since you can just simply plugin your old laptop into its power supply, and leave it be, for such to have a dedicated home web server, constantly accessible from anywhere you are in this world. Besides, at least on my Mac, the networking drivers for VirtualBox doesn’t seem to be perfectly stable for some reasons.

Since a Linux Ubuntu Server installation, consumes very small amounts of resources, this means that your “laptop server” could probably run for years, without any major troubles happening. But please, consider making sure you take backups of it, every now and then! But first, what the blip is a LAMP-5 home web server, and home cloud …?

Well, check out this video for a simple explanation …

In the video below, I am demonstrating how to install Sephia Five afterwards, which is a military grade cryptographically secured webmail client, allowing you to read your emails, on any device you’re on, from anywhere you are in this world, through your LAMP-5 setup. Notice, LAMP-5 means; “Linux, Apache, MySQL+Mono and Phosphorus Five”. But I guarantee you, it’s at least 5 times as cool as pure LAMP … 😉

You can find the recipe for what to do below the video. However, please watch the video first, since there’s a lot of nice tips and tricks in it for you.

First download and install Virtual Box, if you intend to use your existing laptop, and don’t have a spare one laying around, which you can turn into a dedicated server. If you have a dedicated laptop, you’ll have to create a bootable USB stick or something, which you can boot your old laptop into. Exactly how to do this, is beyond the scope of this little tutorial, but Google is your friend here … 😉

Then download and install Ubuntu Server.

Install your Ubuntu Server, and make sure you follow its default installation. Don’t install Apache or MySQL, since we’ll do that in an automated script later. One thing, which might be wise of you to do though, is to make sure you set it up, such that it automatically downloads and install updates. After a couple of years, typically your server might contain security holes, which you could automatically avoid, by having it automatically install any updates, without you having to ever again even look at it! Servers are things we tend to take for granted, and which simply works, and hence we don’t think consciously about updating them, as new security updates are released. Making sure it automatically updates itself, is probably a wise thing …

Below you can find the complete recipe for how to setup your LAMP-5 server, assuming you’ve got your Ubuntu Server up and running.

chmod +x
sudo ./

Basically, that’s it! After having executed the above 3 lines of Terminal commands on your Linux Server, everything should work perfectly. Notice, execute one line at the time! The above script installed the following automatically for you.

  • Apache
  • MySQL (without networking)
  • Mono
  • mod_mono (and made some changes, to allow for most URLs to be routed into Mono directly)
  • GnuPG (to store your PGP key pairs)
  • Phosphorus Five (with its Bazar, and everything)

When you have executed the above, your LAMP-5 stack is basically up running, and you can setup P5 by visiting your server’s IP address, in your browser. Hint, don’t access it externally just yet. Use your local LAN IP address to set it up first. Also, please keep on reading, since there are some majorly important additional security steps you should follow, before you go berserk with your own personal home web server and cloud …

One crucial point, which I didn’t talk about in the video, is the fact that you probably don’t have a static IP address with your internet service provider. For the most parts, this haven’t historically been a big problem, since for some reasons, most ISPs tends to allow you to lease your IP address for an extensive amount of time, before they release it, and give you a new one. However, if this is a problem, you might want to talk to your ISP, and request a static IP from them. For my ISP, this would cost me apprx. 3-4 dollars extra per month.

If your server is slow, you might also want to upgrade your outbound bandwidth. This is not the same as being advertised by your ISP as “bandwidth”, since they tend to market only inward bandwidth. For instance, my line is a “50 megabit line”, however my upload speed is only 5 megabit. This makes it slow while downloading huge files and such from the outside. But for simply reading my emails and such, it’s more than adequate.

Also, **DO NOT ACCESS YOUR WEB SERVER REMOTELY FROM YOUR EXTERNAL IP** before you have setup an SSL certificate. The reason is that when you login to P5, the password will be sent in clear text, unencrypted. To setup an SSL certificate on your web server, is ridiculously easy though. Simply check out the tutorial over at this link. Or run the following script in your terminal.

sudo apt-get update
sudo apt-get install software-properties-common
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install python-certbot-apache
sudo certbot renew –dry-run

The above will do everything automatically for you, and setup your server with an SSL certificate, encrypting all traffic between clients and your web server. It will even create an automated job, automatically renewing your certificate, every 90 day!

When you have done so, you’d probably want to visit your router, which can be done at, from where you can setup a port forwarding rule for your HTTP port (80), and its associated HTTPS port (443).

If you’re denied access to your router, you should find its brand and model number somewhere, typically on the router’s main landing page. Simply Google its brand and number, add “password” to your search query, and you’ll probably find its default username and password combination, somewhere out there. Typically its something like “admin/admin”. But this depends upon your router vendor.

Make sure you open up both port 80 and port 443, and that you forward all requests on these two ports to your Ubuntu Server’s IP address, which you can find with the following command in your terminal.

ifconfig | grep addr

When you’ve done this, you might consider registering a domain, and forward it, or some sub-domain beneath it, to your external IP address. See the video for details about how I have done this. A domain typically costs you $10 annually.

Spyware Eclipse

Companies that knows a lot about their customers, inevitably becomes tempted into using that information, some ways that its users hadn’t anticipated. It’s simply how human nature is built! The only fix for this, is to completely eliminate this temptation, by allowing people, and companies, to host their own data. Privacy cannot exist in Silicon Valley. It’s 100% fundamentally incompatible with the average Silicon Valley company’s business model.

Phosphorus Five’s goal, is to completely commoditise the infrastructure that built companies such as Google and Facebook, giving it away as Free and Open Source Software, allowing people and companies, to setup their own private little garden of tools, such as GMail, blogging, File Sharing, AppStores, etc, etc, etc. All within the comforts of their own homes, if they wish!

Within days now, I will have a complete web operating system, or a “home cloud system”, if you prefer that name. This system will allow any geek, and/or company, to create their own “AppStore”. It will allow them to host their own “GMail”. And over time, will completely replace the entire value proposition of most Silicon Valley based companies. Next on my TODO list, is File Sharing, then publishing, etc, etc, etc. When I’m done, you can simply run a simple installer script on one of your old laptops, forward a firewall port to your laptop, and basically have your own distribution channel. Everything perfectly encrypted of course, with security measures making even the lunar landing seem like pie …!!

Sorry Google, you’re obsolete!

Check it out, if you don’t believe me …

Creating a DIY guerilla home cloud tutorial

Here’s a little tutorial on how to setup your own personal web server, on nothing but your existing computer equipment. Notice, I am using my MacBook Air, which I have installed VirtualBox onto – But any laptop or computer will suffice. On my VirtualBox I have created a Linux virtual machine, which I have installed a fresh Ubuntu Server 16.04.3 LTS on top of.

First download and install VirtualBox. Then download Ubuntu Server. Create a new Linux type of virtual machine, by clicking the “New” button in VirtualBox. When you start your virtual machine, you’ll be asked to point it to an ISO image, at which point you can point it to your Ubuntu server download .ISO file.

Notice; Keyboard mapping is a nightmare between a Mac, through VirtualBox and into Linux. Hence, it might be beneficial to choose to install SSH during the installation, and such use your Mac terminal, to SSH into your machine as you run through the rest of these scripts. At the very least, make sure you pick the right keyboard layout. Meaning, if you’re on a Mac host operating system, make sure you choose Mac keyboard. That way, at least you’ll have “less trouble”.

During the installation, I choose the “default” installation, without anything extra stuff, such that I could control how to install Apache and MySQL on it afterwards. You might benefit from adding SSH support, especially since keyboard mapping is a nightmare, especially from Mac OS X, through VirtualBox, and into Ubuntu. Hence, the only practical way to actually be able to create some of the more special characters, will be by SSH’ing into your system, from your host Mac OS.

When your virtual machine is up running, it’s important that you set its network settings into “Bridged Adapter”. You must shut down your virtual machine to do this, for then to click “Settings/Network” on your machine in VirtualBox. Below is a screenshot of how this looks like for me, on my Mac. To shit down the machine, click CMD+Q on a Mac, and choose to turn it off. Then modify your virtual machine’s settings

Then start your Ubuntu server, login, and start configuring it. Type in the following at your terminal from within your Ubuntu machine.

sudo apt-get install apache2
sudo apt-get install mysql-server

The first line will install Apache, the second will install MySQL. During the installation process of MySQL, you will be asked to supply a password. Remember this password, since we’re going to have to modify Phosphorus Five’s web.config file, to add this password into it. Then type in the following.

sudo apt-get install mono-complete
sudo apt-get install libapache2-mod-mono
sudo apt-get install unzip

These three lines install Mono, mod_mono which are Apache bindings for Mono, and unzip, since the binary download for Phosphorus Five is only distributed in zip file format at the time being. You might get away with installing only some sub portion of Mono, since the above will pull in everything. However, this is left as an exercise for the brave at heart to figure out.

Then we need to download Phosphorus Five. This can be done with the following command from your terminal.


After the download is complete, unzip the file, with the following, copy its content to your main www root directly, and delete the default index.html file.

sudo cp -R p5/* /var/www/html
sudo rm /var/www/html/index.html

Change the MySQL password in the web.config file for P5, by typing the following into your terminal.

sudo nano /var/www/html/web.config

The connection string to MySQL is some ways down in this file, so use your arrow down key, until you can see the following key “MYSQL_GENERIC_CONNECTION_STRING”. Add “password=YOUR_MYSQL_PASSWORD;” after the “User ID=root;” parts. Make sure you type in the actual password you used during installation of MySQL, and not the placeholder password in my example. When you’re done, click CTRL+O to save this file, and CTRL+X to close “nano”, which is the editor you just used to edit your web.config file.

Afterwards, you must give the Apache process ownership over the entire root WWW folder. This can be done with the following.

sudo chown -R www-data:www-data /var/www/html

This will allow the Apache process to create and delete files in your WWW root folder, which is necessary for Phosphorus Five to function correctly, since among other things, it allows you to install apps, from within your browser. Notice, we could have fine grained this further, by only giving it access to “db”, “auth.hl” and “modules”. However, for simplicity, we just gave it control over everything. In a real live environment, where security demands are higher, than our little example – You might want to take a more “fine grained” approach. Feel free to experiment here.

Then we’ll need to install GnuPG, to host our PGP keys.

sudo apt-get install gnupg2

GnuPG requires a folder, if it is to be used in combination with Apache, which you can create with the following command.

sudo mkdir /var/www/.gnupg

Then Apache must be given ownership over that folder too, which can be done with the following command. Notice, P5 downloads, installs, and reads your GnuPG keys – Hence, it’ll need complete access to everything within this folder.

sudo chown -R www-data:www-data /var/www/.gnupg

The last command, allows Phosphorus Five to download new keys, and read PGP keys, which belongs to the Apache process’ user.

P5 does its own URL rewriting. This means that we must slightly change the default mod_mono configuration, to also allow all requests that aren’t requests for files, to be automatically forwarded to ASP.NET. This is done by editing your mod_mono file, which can be done with the following command.

sudo nano /etc/apache2/mods-enabled/mod_mono_auto.conf

The above will open up nano, again, which is our text editor of choice, at which point you can add the following somewhere just before the first “DirectoryIndex” setting.

<FilesMatch "^[^\.]+$">
    ForceType application/x-asp-net
<Files ~ "\.hl">
    Order allow,deny
    Deny from all
<Location "/users">
    Order allow,deny
    Deny from all
<Location "/common">
    Order allow,deny
    Deny from all

The above setting will force all URLs that doesn’t contain a “.” within them, to be forwarded to ASP.NET, making a URL such as for instance “/bazar” to be handled by P5. In addition, it will prevent serving any Hyperlambda file. After that, it will prevent anything from within the “/users” and “/common” folders to be served. Save your file with CTRL+O, and quit nano with CTRL+X.

Afterwards, you’ll have to modify your Apache instance, to disallow the browsing of folders. This is done by opening up your main Apache configuration file, with the following command; “sudo nano /etc/apache2/apache2.conf”. Then replace the parts which says.

<Directory /var/www/>
        Options Indexes FollowSymLinks
        AllowOverride None
        Require all granted

Remove the “Indexes” by replacing it with the following.

<Directory /var/www/>
        Options FollowSymLinks
        AllowOverride None
        Require all granted

Notice, this is where it starts getting difficult actually using your terminal inside of Linux directly, due to keyboard mappings. If you want to, you can check out your server IP address, using the following; “ifconfig | grep addr”, for then to connect to your Ubuntu server using SSH, with the following “ssh my_username@192.168.0.x”, where the “x parts” is your AP address of your Ubuntu server.

At this point we’re done, and all you’ll need to do, is to restart Apache with the following command.

sudo service apache2 restart

Now, all you’ll have to do, is to figure out your Ubuntu server’s IP address, which you can do with the following.

ifconfig | grep addr

On my Ubuntu Server, this shows me “”. If you go to that URL with your browser on your “host operating system”, which for me is my MacBook Air, it should load up Phosphorus Five, and ask you for a server salt. It should resemble something like the following, from the beginning of the following video.

Type in some server salt, create a root password, and voila! You’re now up running. Though, you’ll still need to expose this Ubuntu Server to the internet, in your router. For most, this would be done by visiting “” in your browser. This shows me the following.

But the above might vary according to which internet provider you’re using, and which router they’ve given you. Typically, if you Google the router’s name, and type, which often is a weird number – You’ll find login instructions to the admin interface of your router.

At this point, you’ll want to forward port 80 to your Ubuntu Server’s IP address. For my router, this is accomplished by clicking “Application and Gaming/Port Range Forwarding”, and making it forward all HTTP requests, by adding a rule that forwards all requests on port 80 to my Ubuntu server’s IP address. Look at the screenshot below to see how you could do this.

Then make sure you save your settings!

At this point, you can visit e.g. What’s my IP, to figure out your external IP address, and simply type in that IP address in your phone or tablet, and you should be able to see your website. Congratulations, you have now setup your own personal web server, and cloud.

Warning!! This website is not encrypted, which means it’s not safe to use for data, which you consider to be private, since your password is passed in as clear text. To get your site encrypted, using SSL, you can for instance get an SSL certificate at Let’s Encrypt, configure Apache to use it, and forward port 443 to also point to your Ubuntu Server’s IP address. If you do, you’d probably want to close down your port 80 rule, to avoid accidents when typing in your password in your P5 home cloud system. Alternatively, create a 302 HTTP redirect rule, or something, in Apache, which forwards all HTTP requests to HTTPS, or something. Feel free to comment in this blog, if you’ve got a nice recipe for this …

Then the only remaining thing left to do, is to remember to have fun. Below you can see me demonstrating my own personal home cloud 🙂

At this point, you can simply plug your computer into a permanent power supply, and simply avoid turning it off, and always have access to your “home cloud”.

Notice, most internet service providers don’t provide you with a static IP, unless you pay a handful of additional bucks for it per month or something. This means that every now and then, your server will change its IP address. If your website becomes unavailable, simply visit What’s my IP, again, and update your bookmarks to point to its new IP.

If you wish to have a static IP, or possibly even a domain, you could probably order a static IP for 3-5 dollars per month from your internet service provider, and register a domain for $10 somewhere, and point it to your IP address. At which point you can visit your home cloud with a URL, such as “”, or something …

The Bazar, a DTC AppStore

When I worked in the winery industry in California, most wineries were obsessed with something they referred to as “DTC”. DTC translates into “Direct To Customers”, and if they were successful in such initiatives, they would often grows their profits by an order of magnitude. The way the wineries would specifically do this in the US, was by attempting to create a personal relationship with their customers, such that they could sell wine to them in the future directly, through e.g. mail order, and similar types of initiatives. My job in these regards, was to create software that incentivised their customers into leaving their email address behind, when they passed through a wine tasting room.

This would reduce any “man in the middle commissions”, and give them control over their own marketing efforts – Contrary to having a distributor in the middle, selling their wines to shops, and often take most of their profits, literally starving the wineries in the process. DTC was considered the “Holy Grail” in wine marketing.

The Bazar, which is demonstrated in the video below, gives software vendors a similar relationship with their customers. By completely circumventing Apple’s AppStore and Google Marketplace, a software company can literally create its own distribution channels, where they distribute web apps, which will simply work on every single client in existence out there. This not only gives them their own distribution channel, but also reduces the development costs of their apps, since they’ll only have to maintain one codebase.

Create an app once, have it work on iPhone, Android, Linux, Mac and Windows – For then to control how it’s distributed yourself.

You don’t have to be a rocket scientist to understand the value proposal here.

For the record, sorry but I can’t help myself in these regards, and must make a confession. I actually like Merlot. Sorry 😉

Home Cloud Systems

Imagine if you could simply keep your laptop on, create a simple firewall/router rule, forwarding 443 port requests to your laptop, and have your own private web server, in your home. Basically, your own personal home cloud system. What would this do for you?

Well, you don’t need to imagine, because I have imagined this for almost 10 years! And I am soon ready to release it into the public domain, for the main stream market. Allowing anyone to simply install a simple “app”, which actually turns your laptop into a web server, allowing you to reach it from where ever you are in this world – Assuming you’ve got a static IP address in your home.

It’s called privacy, because it’s yours!

Cyber Security, the canary bird in the coal mine oath

An extremely large portion of big software companies and projects today, are being coerced into cooperating with intelligence organisations, to consciously create backdoors into their software, which these intelligence organisations can utilise to gain access to these same systems. As the WikiLeaks Vault7 revelations showed us, this is the by far most important security threat in the world today, since these same backdoors can be used by other organisations. So regardless of whether or not you think for instance the CIA and/or NSA has a right to access your data, which I don’t for the record – This creates backdoors in your IT infrastructure, that other organisations can use to break into these same systems, ipso facto potentially giving Al Qaeda or ISIS access to read your private email, or spy on your wife as she is undressing in your bedroom, which is an actual example taken from the “Weeping Angel” project.

When a software vendor is coerced into cooperating with a government organisation to create such backdoors, they’re always also coerced into signing an NDA, or a non-disclosure agreement, where they’ll have to promise to never publicly speak about these backdoors. These NDAs often has wording such as “if you disclose this agreement to the public, you will be criminally prosecuted, risking life in prison”.

Paradoxically, this simple trait of these NDAs, can be utilised to your advantage. Simply since even though you’re not allowed to speak about such things after it occurs, nothing legally stops you speaking about it before it occurs!

The “canary bird in the coal mine” trick is based upon this simple fact. It is basically a sworn oath you can easily give your customers, that you have not created backdoors in your system, or been contacted and coerced into creating such backdoors. Since they (CIA and NSA etc) can legally force you to signing an NDA when they coerce you to create such backdoors, but not force you (legally) to lie under oath, you can use this simple trait to create a sworn oath, that you have not done such a thing.

And even if they could coerce you into lying under oath, they can still not coerce you into lying convincingly, such that a good psychologists, and/or human behavioural expert would catch your lie. Hence, such an oath, should clearly show the important parts of your body, in a high resolution video, allowing for a psychologist to analyse the video, if necessary.

Every time you later create an update to your software product, or a new version, your customers would expect you to create another such sworn oath for its updated version. If no such sworn oath is released, your customers can basically assume your system has been compromised, by you having been coerced into creating such backdoors. Especially if you’re not willing to give such a sworn oath if asked.

This creates a “canary bird in the coal mine” situation, where once the bird stops singing, its users should abandon the product. And only if another new sworn oath is given by the software vendor, they should upgrade their existing systems. Below is my first such oath, hopefully in a long range of similar oaths, promising that I have not consciously created such backdoors in Phosphorus Five, and/or its related products.

Unless your software vendor is willing to give you similar guarantees, such as I give in the above video, you should not trust it, assuming there are backdoors in the system. Simply since the vendor is not allowed to talk about such backdoors if they exist, while at the same time are also incriminating themselves if they create a sworn oath about that such backdoors do not exists, while such backdoors actually do exist!

Hence, a software vendor who have such a collaboration, and have consciously created such backdoors, might be criminally prosecuted if he or she creates such a sworn oath, and his testimonial is a lie!

I would like to encourage you to demand from your software vendor, that unless he or she is willing to create a similar oath, to the one I gave you above – You will leave your vendor, and find alternative systems and/or vendors. This allows you to “smoke out the Judas” in your IT infrastructure, without forcing anyone to break the law.

Send a link to this article/video to your local software vendor, and demand of him to sing, under the threat of that unless he does, you will leave his products. Then let the world know if your software vendor was not willing to give such an oath! Send a link to your local software vendor, on e.g. Twitter or something, and demand of him to sing!

You should never use a software product, unless your vendor is willing to give you a similar oath, as I gave you in the above video!!

Edit – I sent a link to this article to Brendan Eich on Twitter, and he immediately responded with a reply I’ll accept. Brendan Eich is the inventor of JavaScript, and a titan developer over at Mozilla. Today he’s working on the “Brave” browser, which is a really interesting project. If Brendan Eich can do it, so can you 😉

Your own Micro Web Operating System, with cryptographically secured “AppStore” integration, 100% Free Software and Open Source

Hehe, just did!! 😀

Whoa, this time I have truly outdone myself. I have basically changed the default download of Phosphorus Five to contain a micro web operating system, which comes completely clean out of the box, with only one single “app”, which of course is an “AppStore”, or the Bazar, as I like to refer to it as.

This Bazar allows you to create and distribute, your own web server apps, in a cryptographically secured context, making the system completely secure, when your users installs your apps. You can create as many Bazars as you wish, by simply adding a URL, pointing to your Bazar declaration file, and such pull in apps from multiple Bazars, aggregating the results, such that all apps, from all Bazars, are displayed to the user, allowing him to choose which apps he wants to install on his web server. Then when you’re ready to release a new app, you can simply edit this Bazar configuration file, and all of your existing users, will all of a sudden see a new app in their Bazar app, which they can download, and automatically install, into their Micro Web Operating System.

Out of the box, there only exists one app in my example Bazar, which of course is Sephia Five. However, the installation process is 100% automated, and even a man in the middle attack, won’t succeed, because the web operating system (Phosphorus Five), will verify that the files downloaded have been cryptographically signed, with a trusted PGP key, according to the list of “trusted app distributors”, allowing you to create your Bazar, pointing to multiple other Bazars, where you choose to add only those you trust, up in your trusted distributor file.

Basically, you can create your own personal “AppStore”, without even requiring hosting, as long as you’re able to somehow distribute a .hl file, being your Bazar app declaration file. Or to say this with more accurate words …

The entire infrastructure of Apple’s AppStore, as Free Software, and a ZERO infrastructure requirement!! 😀

In fact, as long as you have a laptop to create code and edit config files, and you have a WordPress account, or a GitHub account, you can effectively outperform Apple’s AppStore, and even distribute closed source apps, for a fee, since it also features automatic PayPal integration – At which point, if you do distribute apps for a fee, the app won’t download to your user’s web servers, before a PayPal purchase has been verified by the root account on the web server, where the installation occurs!

What can I say, 1984 just got smashed!! 😉

For the record, this is a developer preview, and a BETA version, and it does have some quirks. If you’d like to check it out though, you can find the goods at GitHub.

If you wish to create your own package, with your own PGP key, you can use something such as the following.

The zip file, must contain exactly one folder, being your actual app.

Phosphorus Five, Zeus – Developer’s preview release

I’ve been known to use big words, sometimes when they were not valid – However, this is truly exiting stuff! Phosphorus Five is now a fully fledged “web operating system”, with its own native App Store (the Bazar), and allows for a ridiculously easy (and secure) distribution model for your apps.

In addition, I can host your apps for you, in my Bazar, for a fee. But if you’d like to setup your own Bazar, this is as easy as changing a single URL, and creating your own private PGP key. At which point, all users of your software, could have an automatic distribution, download and installation process, of whatever apps you choose to host, in your own personal Bazar. Basically, yup – I’ve created an Open Source and Free Software “AppStore”, which you don’t even need your own server to freakin’ host yourself! 😀

If you’d like to test out the latest Zeus release, and its associated Bazar, feel free to download it here. Please notice two things though.

  • This is a developer’s preview BETA release, not intended for the general public.
  • I might choose to change things and implementation details, meaning if you’d like to start creating stuff, be aware of that some features might change in the final stable release.

To put the importance of this release into context, realise that you only have to download Phosphorus Five, and once it starts up, it will show you a “desktop”, with your installed apps. The first time you start it, this desktop will be initially empty, allowing you to open the Bazar. When you open the Bazar, you can download and install Sephia Five, automatically, within a cryptographically secure context, ensuring you’re not installing malicious code into your system. Below is a screenshot of how the Bazar will look like, during installation of Sephia Five.

For the record, you can still use Phosphorus Five together with System42, since during startup, if System42 is installed, it will “override” the main desktop logic. However, I would encourage you to at the very least check out how the environment looks like, when you only install Phosphorus Five. You can also get entirely rid of the main “desktop”, by simply deleting the “desktop” and “bazar” folders, and create your own [p5.web.load-ui] hook, at which point you’d have a completely empty system, allowing you to create your app(s) entirely from scratch, completely bypassing these features.

I’ll create some videos demonstrating this over the next couple of days, but believe me, you should be exited about this!! 😀

In addition, I have started a new tradition as of today, which you can basically see in the YouTube video below. Basically, if I create a release in the future, and I am not giving you the same sworn testimonial as I do in the video below, you should assume that P5 has been compromised, and that it contains consciously created backdoors, which I have been coerced into creating, on behalf of some intelligence organisation.