Stop Doom Scrolling, Start Doom Coding: Build via the terminal from your phone
Prior Art: Coding on Phones Isn’t New
- Many note they’ve long used phones as terminals (SSH + tmux + vim/emacs/neovim), sometimes because a phone is their only device.
- Android tools (Termux, QPython, Pixel’s Debian VM, Nix-on-Droid, etc.) already allow full local dev stacks.
- iOS users rely on SSH clients (Blink, Shellfish, Termius) and remote machines, since local shells are more constrained.
- Several describe past eras of “coding under constraints” (PalmPilots, Nokia N900, library terminals, even paper).
Ergonomics, Focus, and Whether You Should Code on a Phone
- Some find phone-based coding miserable: cramped screens, bad keyboards, interruptions, hard to concentrate, worse diff review and research.
- Others use it for incremental changes, CI fixes, bug patches, or “micro-sessions” (on trains, in waiting rooms, between gym sets).
- A counterpoint argues these in-between moments are better used for rest or micro-exercise, not squeezing in more work.
- Multiple comments push back on “coding at the club” / in motion as an anti-pattern and a health risk (posture, neck, attention).
AI “Doom/Vibe Coding”: Hype vs Utility
- Enthusiasts say Claude Code and similar tools make phone-based development viable: you mostly write prompts, not code; agents handle editing, running tests, and even PRs.
- Examples given: home automation scripts, web apps, infra/terraform changes, bugfixes on the go, hobby MVPs built largely via chat.
- Others call this “just prompting” or “not real coding,” worry about huge unreviewed AI PRs, and fear erosion of actual engineering skill.
- Some see it as a big productivity boost for time-poor parents or commuters; skeptics see AI marketing and “slop” generation.
Tooling, Infrastructure, and Alternatives
- Canonical stack in the thread: Tailscale (or WireGuard/OpenVPN) + SSH/mosh + tmux/zellij + remote Claude/Codex/Gemini CLI.
- Issues raised: scrolling in tmux on mobile, keeping sessions alive, needing a 24/7 machine, and security of exposed services.
- Workarounds: wake-on-LAN proxies, auto-shutdown, sandboxed VMs/containers, Git-based workflows where AI opens PRs for review.
- Alternatives: Replit, happy.engineering, OpenCode web UIs, GitHub Copilot Issues, Telegram/Discord/email bots controlling agents.
Security and Privacy Concerns
- Several warn about exposing identifiers, open SSH, and leaving home machines unlocked.
- Email-based or chat-based interfaces are suggested but criticized as slower and less secure unless carefully authenticated and encrypted.