• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline !technology @kieron115
In reply to 5 earlier posts
@fne8w2ah@lemmy.world on lemmy.world Open parent
Open parent Original URL
581
0
222
@brucethemoose@lemmy.world on lemmy.world Open parent
Playing devil’s advocate, I understand one point of pressure: Plex doesn’t want to be perceived as a “piracy app.” See: Kodi. kodi.expert/…/mpaa-warns-increasing-kodi-abuse-po… To be blunt, that’s a huge chunk of their userbase. And they run the risk of being legally pounded to dust once that image takes hold. So how do they avoid that? Add a bunch of other stuff, for plausible deniability. And it seems to have worked, as the anti-piracy gods haven’t singled them out like they have past software projects. To be clear, I’m not excusing Plex. But I can understand such an unspoken motivation.
Open parent Original URL
0
0
0
@explodicle@sh.itjust.works on sh.itjust.works Open parent
It’s really nice of them to fight the good fight while I use Jellyfin instead.
Open parent Original URL
0
0
0
@AtariDump@lemmy.world on lemmy.world Open parent
Which doesn’t have half the features and crap security compared to Plex/Emby.
Open parent Original URL
0
0
0
@xthexder@l.sw0.com on l.sw0.com Open parent
The security thing is ironic because my personal Jellyfin server (nor anything else on it) has been hacked, but Plex itself has had their database leaked recently. It’s actually the main reason I switched because I don’t like their auth servers being a giant common target.
Open parent Original URL
0
0
0
4
kieron115 in !technology
@kieron115@startrek.website · Dec 08
From their blog post about it: An unauthorized third party accessed a limited subset of customer data from one of our databases. While we quickly contained the incident, information that was accessed included emails, usernames, securely hashed passwords and authentication data. Any account passwords that may have been accessed were securely hashed, in accordance with best practices, meaning they cannot be read by a third party. The passwords were hashed and, I’m inferring from their language, salted per-user as well. Assuming a reasonable length password (complexity doesn’t matter much here, what we want is entropy) it would take a conventional computer tens to hundreds of millions of years to crack one user’s password.
View on startrek.website
4
2
0
Sign in to interact

Comments (2)

Showing 0 of 2 cached locally.
Syncing comments from the remote thread. 2 more replies are still loading.

Loading comments...

About Community

technology
Technology
!technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules
  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots
  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
83894
Members
18811
Posts
Created: June 11, 2023
View All Posts
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: pop3.elektrine.com:995

SMTP: mail.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 23:00:32 UTC