Self-Hosting vs Hosted: Which Private Calendar Setup Is Right for You?
privacyself-hostingencryption

Self-Hosting vs Hosted: Which Private Calendar Setup Is Right for You?

Tim Ross·
·
6 min read

Self-host everything is the default advice in privacy circles. But does it actually make your calendar more secure? We compare self-hosted CalDAV, hosted E2EE services, and the hybrid option.

If you spend any time in privacy communities, you'll hear one piece of advice repeated like a mantra: self-host everything. Run your own email server. Run your own cloud. Run your own calendar. And honestly, we get it. The instinct is right. If you control the hardware, you control the data.

But there's a gap between the ideal and what most people can actually sustain. Self-hosting a calendar is not like installing an app. It's more like adopting a pet that needs constant feeding. A pet that, if you forget about it for a few weeks, might leak your medical appointments to the internet.

We built SilentSuite for people who want private calendar sync without becoming full-time sysadmins. But we also made it self-hostable, because we think you should have the choice. So let's talk honestly about both paths.

The self-hosting path

The most common self-hosted calendar setup is Nextcloud with its built-in CalDAV server. Other popular options include Radicale and Baikal. All of them work. All of them give you a CalDAV endpoint that syncs with standard calendar apps.

Here's what you actually need to run one:

  • A VPS or home server (and if it's at home, a static IP or dynamic DNS)
  • Docker or bare-metal Linux administration skills
  • SSL certificates (Let's Encrypt, renewed automatically if you set it up right)
  • A reverse proxy like Nginx or Caddy
  • Regular backups to a separate location
  • Security updates. Not just for your calendar software, but the OS, the web server, PHP, the database
  • Monitoring, so you know when something breaks at 2 AM

This is a real commitment. Not a weekend project you set and forget. If you're already running a homelab and enjoy this kind of work, it slots right in. If you're not, you're signing up for ongoing maintenance that only you can do.

What self-hosting gives you

Full control. That's the short answer. You pick the hardware. You pick the data centre (or your closet). You decide which software version runs, when it updates, and who has access. There is no third party involved. Nobody can change the terms of service on you, raise prices, or shut down the product.

For some people, this is enough reason on its own. We respect that. Self-hosting is a legitimate choice, and it's one we actively support by making our own server code open source.

What self-hosting doesn't give you

Here's the part that gets glossed over in most self-hosting advocacy: self-hosting does not automatically mean your data is encrypted.

Nextcloud stores your calendar data in a database. In plaintext. Radicale stores it as .ics files on disk. Also plaintext. If someone compromises your VPS, they can read every event on your calendar. If your hosting provider images your disk, same thing. If you forget to renew your SSL cert and fall back to HTTP for a day, your calendar data travels across the internet unencrypted.

Self-hosting means you are the security team. You handle intrusion detection, firewall rules, SSH hardening, software vulnerabilities. That's fine if you have the skills. But it's worth being clear-eyed about what you're taking on.

Owning the server doesn't mean the data is safe. It means you're the one responsible for making it safe.

Self-hosted Nextcloud
Your server, plaintext data
Server sees: events in plaintext
If breached: events readable
Trust model: trust yourself to never make a security mistake
Hosted E2EE
Our server, ciphertext only
Server sees: encrypted blobs
If breached: no usable data
Trust model: trust the math, not the operator

The hosted path with end-to-end encryption

There's another approach: use a hosted service, but one where the server literally cannot read your data. This is what end-to-end encryption (E2EE) gives you.

With E2EE, your calendar events are encrypted on your device before they leave it. The server stores ciphertext. The server operator, whether that's us or anyone else, cannot decrypt it. They don't have the key. A breach of the server reveals nothing useful. A subpoena returns encrypted blobs.

The trust model is fundamentally different from traditional hosting. You don't trust the server. You trust the math. The cryptography is what protects you, not a company's promise or a privacy policy.

A few services take this approach for calendars:

  • SilentSuite (that's us): E2EE calendar, contacts, and tasks sync using the Etebase protocol. Open source. Zero-knowledge encrypted.
  • Proton Calendar: E2EE, bundled with Proton Mail. Closed ecosystem, but solid encryption.
  • Tuta Calendar: E2EE, part of the Tuta email suite. Similar trade-offs to Proton.

The hybrid option

Here's where it gets interesting. SilentSuite is fully self-hostable. Our server is open source under AGPL-3.0, and you can run it on your own infrastructure.

That means you can have both: E2EE and full control of the server. Your data is encrypted before it reaches the server, and the server is yours. Even if someone breaks into your VPS, they get ciphertext. Not your calendar.

This is the best of both worlds for people who want it. But the key point is: you don't have to. The hosted version gives you the same encryption guarantees without any of the server maintenance. The self-hosted option exists for people who want the extra control, not because the hosted version is less secure.

The hybrid setup: E2EE plus your own server
Encryption happens on your device. Your server only ever holds ciphertext. Even if the box is breached, the events are unreadable.
Your device
encrypts events
ciphertext
Your server
stores ciphertext only

Cost comparison

Let's talk money, because people often undercount the real cost of self-hosting.

  • Self-hosted VPS: $5 to $10/month for a basic server (Hetzner, Contabo, DigitalOcean). Plus your time for setup, updates, backups, and troubleshooting. If you value your time at all, this adds up. A single evening debugging a broken Nextcloud update after a PHP version bump is worth more than a year of hosting fees.
  • SilentSuite hosted: From €3/month. We handle the server, the updates, the backups, the monitoring. You get E2EE sync that just works.
  • Proton: Calendar is included with Proton paid plans, starting around $4/month. But you're buying the whole Proton ecosystem, which may or may not be what you need.

The hidden cost of self-hosting is time. Not just the initial setup, but the ongoing obligation. Security patches don't apply themselves. Backups need testing. Certs need renewing. Disks fill up. Things break on holidays.

Who should self-host

Self-hosting makes sense if you:

  • Genuinely enjoy running servers and treating infrastructure as a hobby
  • Are a sysadmin by trade and this is just another service on your stack
  • Have specific compliance requirements that mandate on-premises data storage
  • Don't trust any third party with your data, even encrypted data
  • Want to run SilentSuite's server yourself for the E2EE plus full-control combination

If any of those describe you, great. We actively support self-hosting and our server documentation is written with you in mind.

Who should use hosted E2EE

Everyone else.

Specifically: people who use Signal instead of running their own XMPP server. People who use Proton Mail instead of configuring Postfix. People who chose Bitwarden's hosted service instead of self-hosting Vaultwarden. The approach is the same. Pick a service with strong encryption, open-source code you can audit, and a sustainable business model. Then get on with your life.

We sometimes call this the “privacy middle class.” Not apathetic about privacy, but not willing to make it a second job either. That's most people. And that's completely reasonable.

Privacy shouldn't require a Linux certification. It should be the default. E2EE hosted services make that possible by shifting the security burden from the user to the protocol. You don't need to trust the server because the server never sees your data in the clear.

The bottom line

Both paths are valid. Self-hosting gives you control. Hosted E2EE gives you convenience with equivalent (and in some ways stronger) security guarantees. The worst option is the one most people are stuck on right now: syncing plaintext calendar data through Google or Apple, where the provider can read everything and you control nothing.

We built SilentSuite for people who want privacy without a second job maintaining infrastructure. Calendar sync that's encrypted by design, hosted in the EU, open source, and simple to use. But we made the server self-hostable too, because we think the choice should always be yours.


Ready to try private calendar sync? Get started with SilentSuite.

Interested in private sync?

SilentSuite is available now. Sign up and start syncing your calendar, contacts, and tasks with end-to-end encryption.

Get Started