and you’re trusting this WAY too much.
I don’t need to trust because I know how it works: https://github.com/jellyfin/jellyfin/blob/767ee2b5c41ddcceba869981b34d3f59d684bc00/Emby.Server.Implementations/Library/LibraryManager.cs#L538
Tools like shodan will categorically identify EVERY jellyfin instance that scanners will run into.
They can’t. Without the domain, the reverse proxy will return the default page.
No. Read the whole thread.
I did.
If your path is similar to my path
It does not need to be similar, it needs to be identical.
- There are 2 popular Docker images, both store the media in different paths by default
- You do not have to follow the default path
- The server does not even have to run in Docker
- The sub path is entirely defined by the user
- You do not know the naming scheme for the content
There are 1000s of variations you have to check for every single file name, with 0 feedback until you get a hit. After you have gone through all that trouble, you can now confirm that the file exists and do great things like retrieve the cover art or the subtitles. None of which is incriminating or useful.
All it takes is for one angsty company to rainbow table variants of their movies name to screw you completely over.
My threat model does not include “angsty company worried about copyright infringement on private Jellyfin servers”.
Why bother scanning the entire internet for public Jellyfin instances when you can just subpoena Plex into telling you who has illegal content stored?
I see we are going nowhere here. You do you, I do me.