this post was submitted on 14 May 2024
3 points (56.0% liked)

Privacy

32159 readers
397 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
3
4chan privacy (lemmy.world)
submitted 6 months ago* (last edited 6 months ago) by MIN3CR4FT_05@lemmy.world to c/privacy@lemmy.ml
 

hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhv

you are viewing a single comment's thread
view the rest of the comments
[–] sleeplessone@lemmy.ml 4 points 6 months ago* (last edited 6 months ago) (1 children)

The only PII the software itself stores are usernames, bcrypt hashes of passwords, JWT session tokens and, if the admin requires it or the user gives it voluntarily, emails. With this in mind, there are still important caveats to keep in mind.

First, there is no way to verify if a given instance is running a fork that collects more information than the upstream repo, not to mention any logging they might be doing. This is where Lemmy being self-hostable is a double-edged sword. On the one hand, if you have the sysadmin knowhow or know someone trustworthy who does, you can setup your own instance that you can be certain doesn't collect any data you don't expect it to. On the other hand, there is no way to prevent malicious actors from making compromised instances.

The other important caveat is that all posts and comments are public. Personal information you post in posts and comments can be used to identify you. This is true of all social media, even ones that don't use usernames such as 4chan and similar chan-like image boards. No amount of software related privacy features can save you from bad opsec.

[–] autonomoususer@lemmy.world 0 points 6 months ago* (last edited 6 months ago) (1 children)

is a double-edged sword.

We can't stop 4chan acting maliciously. It's SaaSS. We don't control it.

[–] sleeplessone@lemmy.ml 1 points 6 months ago (1 children)

I didn't say otherwise. If anything, considering it's 4chan we're talking about, I expect it to be malicious.

[–] autonomoususer@lemmy.world 0 points 6 months ago* (last edited 6 months ago)

Reinforcing it. Often disinformation will use one vulnerability to justify regressing to something with more vulnerabilities.