So I created an open-source Lemmy bot to reply to posts/comments with YouTube links with converted Piped links to preserve your privacy.

Piped is an open-source alternative privacy-friendly frontend to YouTube. You can watch the same content from YouTube without connecting to Google’s servers.

You can find the source code at: https://github.com/TeamPiped/lemmy-piped-link-bot

You can find Piped’s source code at: https://github.com/TeamPiped/Piped

PS: I’m the author of Piped :P

  • snor10
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    What is the difference between piped and invidious?

    • kavin@feddit.rocks
      cake
      OP
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 year ago

      Piped can be more privacy friendly in a few cases, as you don’t need an account for subscriptions or playlists.

      Here are some differences to Invidious:

      • Subscriptions don’t necessarily require an account
      • Playlists don’t necessarily require an account
      • Piped supports Infinite scrolling
      • Piped supports Webm videos
      • Piped can stream videos from Odysee if the same video is available there.
      • Piped is a lot lighter on the server
      • Piped always proxies your traffic to Google’s servers (most Invidious servers don’t proxy videos to YouTube by default)
      • Piped has SponsorBlock integrated (DeArrow will be added soon)
      • Piped has ReturnYouTubeDislike support via RYD-Proxy
      • Piped can only be self-hosted on a server. Invidious on the other hand can work fine on local networks.
      • Piped is a lot easier to administer than Invidious as an instance operator.

      I’ll conclude by saying that I was once an Invidious user. I decided to write Piped at a time when Invidious was riddled with extremely odd bugs and performance issues. Some of these issues still persist to this day. I’ve always kept performance a top priority in Piped. I wanted to create a better alternative to YouTube than Invidious for my use case and threat model. I think I have succeeded in that :)