• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle






  • Who cares? Generating an infinite number of tokenized identities to facilitate ban evasion will just result in an instance getting defederated. This introduces no real risk as long as the instance is generally abiding by the rules.

    Most of us here are fairly anonymous anyway. I dont think being able to add an additional layer of privacy to our activity is really a big deal.



  • Agreed. 10/10.

    And you don’t even need real crypto here to start. The home instance can just send vote actions as fixed unique tokens. The way the trust framework currently works, this is literally a drop-in replacement and introduces no new spam/brigade vulns which don’t already exist from a rogue instance. It would be imperfect, and may still make it possible to correlate and infer vote patterns for a sufficiently motivated adve, but it would raise the bar for protecting user telemetry by a huge factor with very minimal effort. I’m honestly a bit surprised it hasn’t been done already.




  • This is actually more evidence that the Lemmy devs run a modified version of the code which gives them the ability to, eg do things like dole out mass community bans. There is also some evidence that they selectively federate the mod log as well. It all points to the obvious conclusion that these people can and will abuse their power in any way they can.


  • That’s the most frustrating part. These “leftists” are the stupid kind who seem to care more about relitigating idiotic cold war drama than evolving or pushing forward leftist philosophy. It’s straight up brain rot, mixed with obvious right wing agitprop disguised as leftist ideology. That fact that anyone other than trolls, spies and teenagers would engage with it is astounding.


  • People are naive if they think the .ml admins and devs don’t intend to keep their thumb on the Lemmy scale. More instances need to take this threat seriously and defederate from .ml, and possibly even fork the Lemmy repos for when the devs inevitably decide they want to start building quiet exploits into the code. There are serious cyber security implications here that people are sleeping on