Already has...
brownmustardminion
Appreciate the thorough reply. Mind sharing which service you used to download your Spotify tracks?
I feel you but I've already got curated playlists of over 3,000 songs me and friends have spent a few years putting together. I actually don't mind the idea of pulling each artists whole disco as lidarr does. My current roadblock is the lack of good resources/tools that automate the process.
I operate an invidious instance. Google has really cracked down the past two weeks on YouTube front ends. Its extremely frustrating.
Invidious devs are finalizing a workaround so hopefully things will be working again in the next week or two.
Is there a way to automate downloads? As mentioned in my original post I'm hoping to essentially mirror a few Spotify playlists and have my server automatically download either all of the songs on the playlist or all of the songs by the artists appearing on the playlists.
Damn. You're correct. My brain saw instance and ignored the rest.
Looking in the NewPipe settings I found a place to enter instances and there is one already configured. I guess I was proxied the whole time without realizing. Thanks for the clarification btw.
I often wish all services could provide an opt out "I'm aware no 2fa is risky but I really don't give a damn about this account so fuck off with the constant email verifications". Or if companies insist on forcing 2fa, at least support hardware keys. Don't even get me started about banks...
If iMessages are e2ee and you aren’t using iCloud, is there any evidence your messages aren’t private? As far as I’m aware iMessage is considered a very secure messaging channel. It seems like most people distrust it due to the Apple affiliation. Not that I blame them, I feel the same about Google.
Just for the sake of getting used to / transitioning to a single gos phone, does it make sense to use the insecure phone as a hotspot and utilize the pixel without a sim (so data only device). I would be using e2e encrypted apps for texts and calls so this makes sense in my head.
Appreciate the info.
It seems absurd to me that a third party online service is required for a hardware key to work in the first place. I figured it would be authenticating strictly between the locked service and the user.
Some other good instances: