Hi all. I just got invited to the Anytype test, and the firewall immediately noticed that the macOS Anytype app is having some outgoing traffic.
Currently I have saw traffics going to *:4101
, *:4001
, *:3006
and *:6888
and some HTTPS requests going to api.amplitude.com
. I can find some of those addresses here but seems not all ports are covered.
But my firewall also detected some pretty weird traffic going to those addresses:
192.168.18.19:62841
10.0.0.250:48148
192.168.0.101:63493
Requests to private addresses like this are rarely seen in other software. So is there any special purpose on connecting them? I’ve blocked nearly all outgoing traffic from Anytype until future news.
Also, considering contents in Anytype are usually sensitive info, maybe there should have a KB so users can know exactly for what it would connect to which addresses, when, and what information are uploaded?