Production-ready infrastructure for individuals

Self-hosting without the second job.

Get the reliability of a managed service on your own hardware. Secure configuration delivery, verified backups, and unified identity management—without the Kubernetes complexity.

The control required by engineers, with the automation needed for life.

The Problem

The Self-Hosting Dilemma

You want control, but you don't want to spend your weekends debugging Nginx configs or recovering failed backups.

Data Sovereignty

SaaS platforms lock you in and mine your data. Traditional self-hosting gives you control but demands constant maintenance.

Our Approach

Full data ownership on your hardware. We provide the control plane; you keep the data.

Operational Overhead

Backups fail silently. Updates break dependencies. Authentication is fragmented. Maintaining a reliable stack is a second job.

Our Approach

Automated integrity checks, secure config delivery, and unified OIDC authentication. Infrastructure that manages itself.

Security & Complexity

Enterprise security tools are expensive and complex to configure. Simple tools often skip critical protections like circuit breakers.

Our Approach

Enterprise patterns (HashiCorp Vault, HMAC signatures) pre-configured for individuals. Security by default, not by configuration.

Landscape

Ease of Use vs. Reliability

Most platforms force a choice between a simple setup that breaks easily, or a robust system that takes a team to manage.

Platform Setup Infrastructure Trade-off
Coolify / CapRover ✅ Easy ❌ Fragile Plain-text env files, untested backups, no monitoring
Cloudron ✅ Easy ⚠️ Limited Proprietary app store, vendor lock-in, limited customization
Yunohost ✅ Easy ❌ Basic Manual backups, no unified auth, minimal monitoring
Kubernetes ❌ Complex ✅ Production-Ready Requires dedicated ops team, steep learning curve
UnboundBytes ✅ Easy ✅ Production-Ready

Your Hardware, Your Rules

Run on a Raspberry Pi, a VPS, or your basement server. Our agent is proprietary but transparent—we document how it works and what it does.

Resilient Automation

Automated backup verification, health checks, and fail-safe updates. Systems designed to recover, not just crash.

Security First

Built by security engineers. Secrets encrypted in transit and at rest. Zero-trust architecture from day one.

How it works

Three simple steps from installation to automated operations.

01
Install

One command setup

Curl the agent installer. It establishes a secure outbound WebSocket tunnel to our edge orchestrator. No port forwarding required.

02
Deploy

Push-to-deploy

Select apps from the catalog. The orchestrator generates secure configurations and pushes them to your agent via the encrypted tunnel.

03
Relax

Automated Day 2 operations

Backups run and are verified. Updates are applied with rollback capabilities. Metrics are aggregated for instant visibility.

Architecture

Secure by Design

A distributed control plane that respects your privacy.

Cloudflare Workers Control Plane

Our orchestrator runs on the edge using Durable Objects for strong consistency. It handles command queueing and state management without ever seeing your payload data.

Secure Agent Communication

No open ports required. The agent establishes a secure WebSocket connection outbound to our edge orchestrator. For app access, we use Cloudflare Tunnels (bidirectional) to provide secure connectivity without exposing your infrastructure.

Rust Agent

A lightweight, memory-safe agent runs on your hardware. It validates command signatures (HMAC), manages the Docker runtime, and streams encrypted logs.

SvelteKit Dashboard

A fast, reactive management console. It communicates with the orchestrator API to trigger deployments and view real-time telemetry from your agent.

Pricing Model

Simple, Transparent Pricing

We charge for the control plane service—the orchestration, backup verification, and secure tunneling. The FOSS apps you run are open source and yours to control.

Community & Support

Platform Access

Everything included:

  • ✅ Unified OIDC Authentication
  • ✅ Automated Backup and Restore
  • ✅ Managed Cloudflare Tunnels
  • ✅ Health Monitoring & Alerts
  • ✅ Full API Access

Sustainable pricing for independent infrastructure.

Why UnboundBytes?

Because "easy" shouldn't mean "insecure", and "secure" shouldn't mean "impossible to manage".

Focused on Reliability

We prioritize 'boring' infrastructure stability over flashy features. Verified backups matter more than animated dashboards.

No Vendor Lock-in

You own the hardware. You own the data. If we disappear, your apps keep running (though you lose the control plane automation).

Transparent Pricing

One flat rate for the control plane service. No per-app fees, no 'enterprise' tax. Simple.

Ecosystem

Community Driven

We are building a sustainable platform that gives back to the open source tools we all rely on.

Upstream First

We don't just wrap apps; we support them. A portion of subscription revenue will be shared with the open source projects we rely on. (Planned—not yet launched, so no revenue to share yet.)

Transparent Architecture

Our protocols are documented. We publish our runbooks and security findings. Built on proven open source foundations.