I'll start by stating my threat model is avoiding corporate tracking, profiling, and analytics. For anything beyond that scope I believe tor is ideal.
Correct me if I'm wrong but my understanding is that Newpipe is a frontend to provide an alternative to the awful YouTube app and/or youtube account. However, your IP along with other device information may still be exposed to google servers. Any ideas as to what info beyond IP is sent to google?
Whereas invidious instances act as a proxy in addition to what is offered by Newpipe, but you are trusting your privacy to the instance owner.
My idea for utilizing these services is the following:
Newpipe for managing subscription based YouTube viewing. Google would have my IP, but this IP would be a VPN IP address that periodically changes. Much more reliable than invidious and better quality. App is great.
Invidious for random video searches as well as content I may want to be slightly more cautious about associating with.
I'm looking for feedback on this conceptual setup. I've also been considering making a public invidious instance that I can use but hopefully obfuscates my viewing through its usage by others.
Piped instances proxy the requests. Some invidious front end proxy but you have to look into it.
I use piped.video for most of my yt needs. You can upload your subscriptions there.
Looking in the NewPipe settings I found a place to enter instances and there is one already configured. I guess I was proxied the whole time without realizing. Thanks for the clarification btw.
If you mean the peertube instances setting, that's for a different platform.
Damn. You're correct. My brain saw instance and ignored the rest.
piped.video (with default instance: kalvin.rocks) doesn’t work a lot of the time. You can use other instances instead if that is the case.
You can change the instance from preference menu.
I thought it was kavin.rocks piped frontend.
Yeah. I know, but expressed it in a bas way. Edited it and now it should be clear :)