

Yeah, in my example, I have various genres of music I listen to and some days I’m in the mood for one and not another. Some of those might have subgenres I am in the mood to listen to. For example: Metal might break into subfolders called black metal, thrash metal, melodic metal, etc. Based on where I feel they belong the most. If I’m in the mood for some melodic metal today, I’ll go there. Or EDM, I’ll have a folder for Psytrance, another for House, etc…
Rather than trying to edit the metadata on thousands and thousands of files every time I change media systems as I’ve done over these years, it’s 100x simpler for me to just navigate to the folders directly and not care about how the system “wants” to organize it. Every media system wants to organize differently and I’m kind of tired of having to spend hours editing all my music just to get it to organize the way that works for me, so that’s where I’ve gotten to the point of just using folder structures.
My personal advice, secure it down to only permitting what needs it, regardless of your trust to the network.
Treat each device as if they’ve been compromised and the attacker on the compromised device is now trying to move laterally. Example scenario: had you blocked all devices except your laptop or phone to your server, your server wouldn’t have been hacked because someone went through a hacked cloud-connected HVAC panel.
I lock down everything and grant access only to devices that should have access. Then on top of that, I enable passwords and 2FA on everything as if it were public… Nothing I self host is public. It’s all behind my network firewall and router firewall, and can only be accessed externally by a VPN.