You’ll find most private trackers want you to use your actual IP to browse the site, especially the ones worth being in
You’ll find most private trackers want you to use your actual IP to browse the site, especially the ones worth being in
Torrentleech has open signups a few times a year usually and it’s a decent general tracker.
You can join Myanonamouse at any time via an easy interview (basically just checking you can read the rules etc) and this tracker is easy to maintain ratio on and can get you invites to other trackers via its invite section
straight up animal behavior
The way that Bitwarden stores your data, it is encrypted as a blob on AWS. If anyone compromises Bitwardens infrastructure, they can’t do anything because even Bitwarden doesn’t have the keys to decrypt your vault.
Your vault can only be decrypted with your master passwords, and decryption happens locally, on device. No decrypted information is sent over the internet.
As far as someone gaining access to your master password and this all other passwords stored in the pass manager, that is why 2 factor authentication exists.
I could give you my Bitwarden master password right now, but that won’t help if you don’t also have my 2fa code.
And that’s just talking about using the hosted version of Bitwarden.
If you self host, you don’t even have to have the app available to the public internet, and can access it purely through a vpn to your LAN.
Then the attacker would not only need to have access to your local network, also know your master password, and have access to your 2fa.
If they know that much about you, you have larger concerns.
So in short, your concern is mostly addressed and not really a concern if you utilize the features provided, such as 2fa
I self host using the vaultwarden implementation, works great
If you don’t use one, then what the hell are you doing?
Also, Bitwarden. Selfhosted
deleted by creator
What does reverse proxies have to do with NASA?
It really ain’t complicated.
Usenet gets all that too