With all the discussion on the security of encrypted content, device access is everything. Running your own relay will be best practice. This rocks