I’ll trust what the cyber security and privacy experts say.
Facebook might know who you’re messaging but that’s also true for Signal.
Signal’s sealed sender does a good job at knowing you’re sending a message, but not who to. All it’ll know on the receiving end is that a message was sent to it.
Of course people have found other methods of identifying this but sealed sender does cover most of the low hanging fruit.
Signal does also purposefully attempt to find ways to not collect any metadata, whilst also making it more difficult for anyone attacking to the servers to find anything. (e.g. ORAM for Secure Enclave operations)
My understanding is that meta used E2EE on your messages themselves, but everything else is up for grabs.
You’ll want to look into the *arr apps.
Specifically… sonarr, radarr and prowlarr.
Wiki is: https://wiki.servarr.com/
Also, jellyseerr looks like a nice requesting front end https://github.com/Fallenbagel/jellyseerr
I haven’t used jellyseerr as I use a VPS that only offers Ombi, but that’s pretty good too.
It’s most likely easiest to use docker to spin everything up.
Thanks,
So they haven’t made an announcement about retiring the proton bridge app yet.
I think I’ll wait until I see them actually remove it before I believe they’re locking us in.