A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 57 users / day
- 383 users / week
- 1.5K users / month
- 5.7K users / 6 months
- 1 subscriber
- 3K Posts
- 75.4K Comments
- Modlog
The only PII the software itself stores are usernames, bcrypt hashes of passwords, JWT session tokens and, if the admin requires it or the user gives it voluntarily, emails. With this in mind, there are still important caveats to keep in mind.
First, there is no way to verify if a given instance is running a fork that collects more information than the upstream repo, not to mention any logging they might be doing. This is where Lemmy being self-hostable is a double-edged sword. On the one hand, if you have the sysadmin knowhow or know someone trustworthy who does, you can setup your own instance that you can be certain doesn’t collect any data you don’t expect it to. On the other hand, there is no way to prevent malicious actors from making compromised instances.
The other important caveat is that all posts and comments are public. Personal information you post in posts and comments can be used to identify you. This is true of all social media, even ones that don’t use usernames such as 4chan and similar chan-like image boards. No amount of software related privacy features can save you from bad opsec.
We can’t stop 4chan acting maliciously. It’s SaaSS. We don’t control it.
I didn’t say otherwise. If anything, considering it’s 4chan we’re talking about, I expect it to be malicious.
Reinforcing it. Often disinformation will use one vulnerability to justify regressing to something with more vulnerabilities.