This software is provided for educational and legitimate use only. Users are solely responsible for ensuring compliance with their local copyright laws and regulations.
Legal Disclaimer
Before using Plank, understand your responsibilities:
- Copyright Laws: Check your country’s copyright laws before using torrents
- File Safety: The developers have no control over torrent content, safety, or legality
- Use at Your Own Discretion: All torrent downloads are at your own risk
- Privacy Protection: Strongly consider using a torrent-ready VPN for privacy protection
VPN Usage (Strongly Recommended)
Using a VPN is strongly recommended for all torrent activities to protect your privacy.
When choosing and configuring a VPN:
VPN Selection Criteria
- No-logs policy: Choose a VPN that doesn’t keep activity logs
- Torrent-friendly: Ensure the VPN allows P2P/torrent traffic
- Kill switch feature: Protects you if the VPN connection drops
- Good speeds: Some VPNs throttle speeds significantly
- Server locations: Choose servers in privacy-friendly jurisdictions
VPN Configuration Tips
- Always connect to the VPN before starting Plank
- Enable the kill switch to prevent accidental exposure
- Test for IP leaks using services like
ipleak.net
- Consider binding your torrent client to the VPN interface
Network Security
Docker Isolation
Running Plank in Docker containers provides an additional security layer by isolating the application.
The Docker setup provides:
- Process isolation from your host system
- Network isolation between services
- Controlled resource limits
Secure Remote Access
Do NOT expose Plank directly to the internet without proper security measures.
For remote access, use one of these methods:
Tailscale (Recommended)
- Provides encrypted peer-to-peer connections
- No port forwarding required
- Zero-trust network architecture
- Access your Plank instance from anywhere securely
VPN Tunnel
- Set up a VPN to your home network
- Access Plank as if you’re on the local network
- Examples: WireGuard, OpenVPN
Reverse Proxy with Authentication
If you must expose Plank to the internet:
- Use a reverse proxy (nginx, Caddy, Traefik)
- Enable HTTPS with valid certificates
- Implement additional authentication
- Use fail2ban or similar for brute-force protection
- Consider rate limiting
File Safety
Never run executable files (.exe, .bat, .scr) from torrents unless you explicitly intend to and trust the source.
Download Safety Checklist
-
Verify file types match expectations:
- Video files should be
.mp4, .mkv, .avi, etc.
- Audio files should be
.mp3, .flac, .m4a, etc.
- Subtitles should be
.srt, .ass, .sub, etc.
-
Check file sizes:
- Suspiciously small files may be fake
- Executables disguised as videos are red flags
-
Scan downloads with antivirus:
- Keep your antivirus software updated
- Scan downloaded files before opening
- Future Plank versions will include built-in scanning
-
Verify torrent sources:
- Use trusted indexers
- Check torrent comments and ratings
- Look for verified uploaders
- Avoid torrents with no seeders or comments
Dangerous File Types
Be extremely cautious with these extensions:
.exe, .bat, .cmd, .scr - Windows executables
.dmg, .pkg, .app - macOS executables
.deb, .rpm, .sh - Linux executables
.iso, .img - Disk images that may contain executables
.zip, .rar, .7z - Archives that may contain malware
System Security
Keep Software Updated
# Update Plank
cd plank
git pull
docker compose down
docker compose -f docker/docker-compose.yml up -d --build
# Update system packages
sudo apt update && sudo apt upgrade # Debian/Ubuntu
sudo dnf update # Fedora
sudo pacman -Syu # Arch
Environment Variables
Keep your .env file secure. It contains sensitive configuration including authentication secrets.
- Never commit
.env files to version control
- Use strong, random values for
BETTER_AUTH_SECRET
- Restrict file permissions:
- Regenerate secrets if they may have been compromised
Database Security
- Keep your
plank.db file secure
- Regular backups in case of corruption or data loss
- Restrict file permissions:
User Account Security
- Use strong, unique passwords for Plank accounts
- Don’t share accounts between users
- Use organization features for multi-user setups
- Assign appropriate admin permissions
Monitoring and Auditing
Check Container Logs
Regularly review logs for suspicious activity:
# View all service logs
docker compose logs -f
# View specific service
docker compose logs -f plank
docker compose logs -f prowlarr
Monitor Resource Usage
# Real-time container stats
docker stats
# Check disk usage
df -h
du -sh ./data
Summary Checklist