Building Our Family Data Vault: Why I'm Hosting Our Digital Lives

April 7, 2026 ·5 min read ·6 blocks ·Mar 2026 – present
solid self-hosting data-sovereignty privacy family

Last month I spent an evening provisioning six digital “pods” on my laptop. One for each of us: my two sisters, my brother, my dad, our boss (yes, really), and me. It felt like handing out keys to a house we hadn’t built yet.

Now that house is taking shape. Here’s what I’m building, why it matters for our family, and the honest trade-offs you should understand before moving in.

The Suitcase Analogy: Your Data, Portable by Design

Imagine your digital life as a suitcase. Right now, your photos live in Google’s warehouse, your messages in Meta’s vault, your documents in Microsoft’s basement. You don’t have keys — you have permission that can be revoked.

Solid pods flip this. Your suitcase has your name on it. It lives on a server (right now, one I’m renting), but it’s yours. The contents are standard files — photos as photos, documents as documents, relationships described in a way any software can understand. If you want to move your suitcase to your own basement, or a service in France, or just keep a backup under your bed, you pick it up and go. No export nightmares. No “your account has been terminated.”

This portability isn’t just theoretical. I tested it: exported a pod, wiped it, re-imported it elsewhere. My WebID — my digital passport — stayed the same. The permissions I’d set (“sister can see photos”) traveled with me. The apps found me at my new address automatically.

What’s In It For Us: The Family Upside

One place for what matters. The wedding album that currently lives in three WhatsApp groups, two email threads, and someone’s fading Facebook. The family recipe grandma only half-remembered. The vacation plan that changes seventeen times before we book. All in one spot, structured, searchable, ours.

Granular sharing. Share the party photos with everyone. Share the mortgage documents with just dad. Grant the house-sitter temporary access to the “home automation” folder, revoke it when they leave. No more oversharing because the app doesn’t let you be precise.

Your family passport to the wider world. Here’s where it gets interesting. Your WebID — stored on our family server — can log you into other Solid-compatible services across the internet. Book a medical appointment using your health data from your pod, without the clinic storing a copy. Apply for a loan using verified income data you bring to them, not the other way around. The family vault becomes your launchpad, not your cage.

The Honesty Clause: What “Trusted Server” Really Means

I need to tell you something uncomfortable. Because I’m the one renting the physical space — the VPS where these suitcases live — I could technically peek inside. Solid’s authentication keeps hackers out. It keeps unauthorized family members out. It does not, by default, keep the system administrator out.

This is true of every service you’ve ever used. Google employees can read your email. Dropbox engineers can browse your files. The difference is: you know me, and I’m choosing to make the invisible visible.

Audit logs: transparency as policy

Every access to your pod gets logged. Not just the obvious ones — your sister opening a shared photo — but every filesystem touch. If I look at your raw files during maintenance, the log shows it. If someone tries to access something they weren’t granted, the log shows it. If an automated backup runs, the log shows it.

You’ll see these logs. Monthly, I’ll send a “family briefcase” — a newsletter showing storage health, fun stats (“we added 247 photos this month!”), and yes, every time the landlord touched the infrastructure. Transparency replaces blind trust.

Client-side encryption: the next layer

For truly sensitive data — medical records, financial details, that novel you’re writing — we’ll add client-side encryption. Think of it as a lock on your suitcase that only you have the key to. I can see the suitcase exists, see its size, see when you open it. The contents are noise to me. This is the gold standard, and we’ll roll it out once the basics are solid.

The Monthly Family Briefcase

As your admin and resident architect, I’ll package updates each month:

Think of it as a neighborhood newsletter for our digital street. I maintain the roads; you own the houses.

What’s Next: The Butler Arrives

Once the vault is stable, I’ll introduce liaison agents — AI assistants that speak human. You’ll text things like:

“Show me last year’s vacation photos” “When is dad’s doctor appointment?” “Does anyone have the recipe for grandma’s soup?”

The agent translates this into queries across our pods and family knowledge graph, respects every ACL boundary, and answers in plain language. No learning curve. No interface to memorize. Just ask.

These agents live in the “OpenClaw” layer you saw in my technical setup — one per family member, plus a security agent that constantly tests our walls for cracks. But that’s a story for the next post.

The Bottom Line

This is an experiment in digital sovereignty. We keep our data close. We share it precisely. We stay connected to the wider world on terms we set, not terms buried in a 20,000-word terms of service.

My role? Keep the lights on. Stay out of your business. Prove it with logs. And build tools that make ownership feel like freedom, not homework.

The suitcases are packed. The keys are cut. The guestbook is open.

Welcome home.

2026-03-01
Provisioned six Solid pods locally — one per family member. First concrete proof that WebID-based identity per person was viable and worth pursuing.
2026-03-08
Tested full pod portability: exported, wiped, re-imported. WebID persisted, ACLs traveled, apps auto-discovered the new endpoint. Portability is real, not theoretical.
2026-03-15
Defined the admin honesty problem: Solid secures data between peers but not from the administrator. Reframed the trust model — transparency via audit logs replaces blind trust.
2026-03-20
Designed the monthly family briefcase format: storage stats, transparency report, feature changelog. Transparency as structured communication, not just good intentions.
2026-03-28
Sketched the liaison agent layer (OpenClaw): natural-language queries over the family knowledge graph, respecting ACL boundaries. Not yet built — the design is clear, the execution is next.
2026-04-05
Client-side encryption scoped as phase 2. The admin-trust problem and the encryption solution converged: encrypt at rest for sensitive pods, audit logs for everything else. Two-layer model solidified.