Personally I like the way that this is implemented; makes it easy to download hidden media files onto my Mac. Anyways, if you’re worried about nudes/pr0n being seen by unauthorized parties, I wouldn’t recommend stashing them in your photos library anyways. There are vault-type apps in the App Store that masquerade as note/calculator apps (Calculator# comes to mind) which are more suited to addressing OP’s use case.
yup it was founded in Moscow and they moved their headquarters to Cyprus. They’ve been open and honest about the whole process.
It would appear that this is indeed the same ghostery that sold its users out to the highest bidder.
I recommend using AdGuard which is free and doesn’t have such serious privacy issues:
also there’s no need to pay, the free tier is more than sufficient
Wow I had no idea that this existed for such a long time. I’ve clearly been living under a rock… 😅
Seconding AdGuard. Also, there’s no need to pay, the free tier is more than sufficient. Links for convenience:
gluetun bundles a control server on port 8000 which you can query for the port number (don’t worry about openvpn
being in the url path, it still works with Wireguard). In my bash script (running on the host system), I use curl
to retrieve the forwarded port number and then do a POST with that data to the API of my qbt client which is running in another container on port 8080.
There’s a reason why most providers don’t allow that feature anymore
Yes, cheese pizza
It’s said that port forwarding is a security risk
Says who? Assuming a fully patched system/client and a properly configured firewall/network, I’d love to hear more about these “risks”.
Also, qBitTorrent works just fine without it.
Only if you don’t care about seeding
Based. I use gluetun with qbt and ProtonVPN (with port forwarding). Despite this being a tricky config, it was still pretty easy to setup. Can share bash scripts if anyone is interested.
I’m personally a big fan of bore. It’s easy to setup/use and there’s a free public instance operated by the developer.
Here’s a link to the PR for anyone who’s interested
As an added layer of security, you can set the phone to self-destruct by going to Settings > FaceID & Passcode > Erase Data. If someone enters the incorrect passcode more than 10 times, the phone will erase itself. Assuming a 6 digit passcode, there are 1 million possible combinations. An attacker would have an effective 1 in 100,000 chance (.001%) of guessing your passcode correctly