personally, I wouldn’t want my files going through plexs servers, especially with how shit I’ve heard they are with their privacy policy. that’s a really interesting concept tho, and makes a lot of sense. I doubt jellyfin will ever do that simply because they don’t have the resources to host that as you said.
thanks for the explanation tho! greatly appreciated
Plex, as a company, definitely is aware of what items are in your library but streams don’t go through the Plex servers unless you use the Plex proxy service which is enabled by default but only used when the client connection speed is too slow to use the desired streaming setting.
Everyone who accesses their Plex externally should use app.plex.tv rather than NAT/port forwarding unless you’re also doing IP whitelisting on the NAT (not feasible for most remote access scenarios, as IPs are dynamic in most cases). Jellyfin should never be exposed externally.
I work in a highly regulated sector of IT and have learned that even the most robust software will have serious exploits at some point.
personally, I wouldn’t want my files going through plexs servers, especially with how shit I’ve heard they are with their privacy policy. that’s a really interesting concept tho, and makes a lot of sense. I doubt jellyfin will ever do that simply because they don’t have the resources to host that as you said.
thanks for the explanation tho! greatly appreciated
Plex, as a company, definitely is aware of what items are in your library but streams don’t go through the Plex servers unless you use the Plex proxy service which is enabled by default but only used when the client connection speed is too slow to use the desired streaming setting.
Everyone who accesses their Plex externally should use app.plex.tv rather than NAT/port forwarding unless you’re also doing IP whitelisting on the NAT (not feasible for most remote access scenarios, as IPs are dynamic in most cases). Jellyfin should never be exposed externally.
I work in a highly regulated sector of IT and have learned that even the most robust software will have serious exploits at some point.