Oh no, what if someone hacks my seedbox and… Uses it to also pirate things?
Aside from just changing the api keys if i notice abuse, i really could not care less if other hackers use my seedbox credentials or “steal” my downloaded files.
This is a fun exercise but ultimately it just goes to show the benefit of a seedbox, even if your box gets “hacked” its not like you would be storing any kind of private/personal info on there… Right?
Depending on the tracker once you notice a stolen API key it might already be too late. E.g. if they tank your ratio or break the rules in another way.
I could see the real source IPs for
all other users in last logs.
Also, they mention in the slides that some seedbox providers allow users to find the IPs of other users connecting to the seedbox. Using a VPN for ssh might be advisable to protect your privacy from other users.
Otherwise your right as it won’t impact your network at home.
Oh no, what if someone hacks my seedbox and… Uses it to also pirate things?
Aside from just changing the api keys if i notice abuse, i really could not care less if other hackers use my seedbox credentials or “steal” my downloaded files.
This is a fun exercise but ultimately it just goes to show the benefit of a seedbox, even if your box gets “hacked” its not like you would be storing any kind of private/personal info on there… Right?
Depending on the tracker once you notice a stolen API key it might already be too late. E.g. if they tank your ratio or break the rules in another way.
Also, they mention in the slides that some seedbox providers allow users to find the IPs of other users connecting to the seedbox. Using a VPN for ssh might be advisable to protect your privacy from other users.
Otherwise your right as it won’t impact your network at home.