• 1 Post
  • 76 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle
  • It’s more akin to having your CD/DVD library visible through the window. All while asserting it’s better to write your info in a place that already has been broken into 3 times.
    Sure jellyfin could do better, but the impact is overblown while literal PII has been stolen from Plex… Sure Sony could see you have Avengers on your instance. Could they prove you got it illegally just from that?


  • Orygin@sh.itjust.workstoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    14 hours ago

    Interesting that you assume this is the list of taken things when that wasn’t what was disclosed to us. And Plex has been absolutely forthcoming with this in the past

    While we quickly contained the incident, information that was accessed included emails, usernames, securely hashed passwords and authentication data.

    They do give what has been taken, tho not the complete list so what exactly is anyone’s guess. By authentication data I assume the history of logins. What I listed is nearly literally what they said.

    Literally everyday since those attack vectors are actively open right now and have been open for 5+ years (jellyfins whole lifetime) and proof of concepted for the developers that whole time.

    That’s not exploitation nor any proof of any data being leaked. Plex was hacked three times, not theoretically like jellyfin, but 3 actual times their service was breached and hackers stole data…
    You do you and keep using it if that makes you feel good, but saying jellyfin is less secure than Plex at this point is laughable.


  • Orygin@sh.itjust.workstoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    edit-2
    21 hours ago

    Doesn’t matter if your info is stolen?
    Name email address, password, access history, and probably IP and location…
    And that’s just what they disclosed, but they don’t have any timeline or real actions taken to prevent continued access. They don’t even tell you what exactly has been accessed: “information that was accessed included emails, usernames, securely hashed passwords and authentication data.”. It’s really not text book response for a security breach.

    But all of that is less important to you than the fact you have Avengers: Endgame in your library?
    They are leeches taking money from you, but you 'd defend them even if they killed your dog.

    Edit: it’s the third time in a decade Plex got hacked. Please list instances where jellyfin leaked the data of all their users.



  • Orygin@sh.itjust.workstoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    6
    ·
    22 hours ago

    But brooo, don’t you know you need to have a cloud login. You neeeeeed it broo, so they can have all your info leaked bro. How else can I give access to somebody if I don’t pay 200+ bucks for the privilege of accessing my own library bro.
    Data leaks happen bro, no need to worry it’s the third time in a decade. This is a text book pro response anyway, they deserve more money bro.
    How dare you suggest people use another software bro, they deserve your money each month, not these leeches giving you free software. Plus Plex is so much more secure anyways, just look at them getting hacked bro. Your jellyfin is so insecure you need a PhD in cyber bro-security to even think about doing it. Look at all the jellyfin instances getting hacked every day. Someone could even guess a UUID and access 10s of playback of my pirates movie bro, see how it’s so full of holes bro










  • Depends on what you’re used to. I have lost too much time trying to get a python or js program to run on my machine.
    Of course if the project is well written and with decent documentation it’s easier, but in general I have had too many incompatibilities with versions of the tooling and the dependencies which may be too ancient to work properly. On the other side, go code that was written a decade ago still compiles fine without thinking about it.
    Hell I even had a js project that was working then 6 months later, without changing any code in it, wouldn’t build. Talking to a front end dev at work he immediately said “oh yeah node was probably updated and you need to do x and y to make it work”. Sorry but I have other things to do than massaging bad tooling to build this.

    Btw, even containers are not a bullet proof solution. I had a python container straight up not work even though it was distributed like that.







  • Wow, I didn’t know that being a Linux/open source contributor meant you don’t have to follow your country’s laws.

    It’s developed internationally but devs still reside somewhere and have to abide by the rules at that place. Linux in this case being represented by an US entity means they have to follow the gov’s sanctions. If you want more or less of those, that’s where (the government) you act.