it could even be made as simple as running a Gitea instance which is a single binary, and a /etc/*.conf
yup - my janky proxy is just a static binary and a config file. the beauty of cryptography is we don’t have to trust the server, the events are signed so it’s easy to spot tampering.