$ xmrhost-cli playbook list --motd
[$ ] playbook/
// NAME
playbook — the 7 workload profiles xmrhost builds for. each one maps to a specific threat model and a specific catalog slice.
// SYNOPSIS
xmrhost-cli playbook list
xmrhost-cli playbook describe --workload=<slug> // DESCRIPTION
The catalog is shaped around seven workloads, picked for the threat models the operator actually sees and answers for: tor relays and bridges (RFC 7686 / Tor Project guidance), crypto nodes and validators, personal-use VPNs (RFC 4301 + WireGuard / OpenVPN), ethical scraping and OSINT pipelines, open-weight LLM inference, mid-sized community / matrix / fediverse infrastructure, and source-protection hosting for newsrooms. None of these are sales pitches — they are configurations the operator has shipped, with the BGP-level, jurisdictional, and AUP boundaries documented per page.
$ xmrhost-cli playbook list
// 7 workload profiles returned. all xmr-billed.
// click a slug for the full playbook — threat model, recommended nodes, region notes, aup boundary.
// for the underlying hardware see node catalog; for region posture see location; for billing rationale see why-monero.
$ ls /usr/share/doc/xmrhost
// curated index of the strategic surfaces. not a sitemap; /sitemap.xml is.
// guide/
// pillars
// vs/