@mattly how did you get the access list? Didn’t know macOS has this feature! Oh and thanks for taking the bullet… guess that’s one option less to evaluate
@mattly I think these developers have made some trade-offs in a tricky space, opting for a solution which strikes a balance between usefulness, impedance, and privacy.
No matter where they end up in the final solution space, there will be people who say "WTF"
I think they've done a pretty good job shipping something that works as-expected for most people while providing documentation for the curious and knobs for the dissatisfied.
Sorry you got this surprise! I hope it didn't ruin your day.
@mattly it's based on the same concepts as (trackerless) Torrents. AFAIK it uses a DHT (Distributed Hash Table) to find and connect to other nodes you own, and uses this for "UDP hole punching", which allows it to communicate with other nodes you own after the connection has been set up. This works by having every node participate in this DHT, just like with Torrent clients. I guess in addition they might also have relays.
I get it feels weird though, I also prefer just self hosting things.