Yep, that’s what I meant.
Yep, that’s what I meant.
My tech-illiterate mom uses my Jellyfin instance with no issues. I sent her a link to the app store, her credentials, my server’s hostname and that was it. And once it’s set up, Jellyfin is much more straightforward to use than Plex.
Sure Jellyfin has issues and doesn’t support as many types of devices, but Plex is far from perfect. I use it like twice a year, and the UI gets more and more confusing with each update IMO.


Yeah but if the script which initiates the connection to the local server is blocked there’s no connection to intercept in the first place.


Nah, the script connects to a server run by the Instagram or Facebook app and feeds it info, bypassing isolation mechanisms entirely. I think ublock or other script-blocking add-ons might work though.


Plex sucks but jellyseer, the *arr stack and jellyfin are all open source and entirely free. Together they provide an experience almost as straightforward as any commercial streaming platform: find a media on jellyseerr and request it with a single click. A few minutes* later the media is available in Jellyfin, and you can watch it on your computer, smartphone, smart TV, …
*with Usenet and a good internet connection


Look up your phone on dontkillmyapp.com and make sure tailscale is excluded from battery and network “optimization”.


Here’s the repo in case anyone is interested in hosting an instance: https://github.com/signalapp/Signal-TLS-Proxy
I know “security experts” from a top French bank who insisted on using telegram instead of signal. So even people who were supposed to stay informed about this stuff fell for the hype and marketing.


I read your comment before the article and I thought you had made the second quote up lol, unbelievable. And people are throwing money at these guys?
Telemetry is not bad in itself. It can be used for bug/crash reports, or usage statistics, without tracking or personal data collection.


I guess it could, as we have to take meta’s word for it, and a quick google search hasn’t turned up any independent security audit.


They don’t want to ban encryption, they want to block encrypted chat apps, precisely so they don’t have to build backdoors. AFAIK it’s not possible to break signal/WhatsApp encryption without access to the targeted device, and once you have access you can get the messages directly without having to break the encryption.


Their own solution is actually better than a VPN for this use case. It’s an encrypted proxy which anyone can download and run, so it’s much harder to block.


Shut the fuck up or I’ll go OTAN on your ass.


It’s standard practice in France too. This is not forbidden by RGPD.
Wireguard, like all VPNs, definitely does E2E encryption. What would be the point of an unencrypted VPN?


As it seems nobody’s linked it yet, have you read Jellyfin’s hardware selection page? They go into great details about which HW features are required/desired.
In my case I’m running it on a NUC with an i3 8109U + 16GB RAM, it runs great with 2 or 3 transcoding jobs at once. Media are stored on 5400-RPM HDDs.


I don’t think the goal is to lock you into their browser, since you still can change it through the GUI. It seems to be part of the recent push to block software which changes hidden settings. The end goal being to lock down the OS and prevent users from disabling features MS wants to push onto them.
They added AES encryption to the spec 20 years ago. It’s pretty-well supported AFAIK.
Proton is WINE, it’s a fork maintained by Valve and Codeweaver with DXVK (Direct X -> Vulkan) on top. If you use Steam for gaming it will set up proton automatically for you.
And yes macOS is a step up from Windows, but it’s still a walled garden. Want to develop an iOS app? You must buy a Mac, you must buy a developer license, you must use the worst IDE ever created, and you must distribute it through the app store (except in Europe in theory, but they worked hard to make the experience so miserable that almost no one bothers).