this post was submitted on 07 Jul 2023
898 points (99.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

55159 readers
325 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 119 points 2 years ago (2 children)

Now is a good time to remind users that you are placing some trust in the instance that you use. Lemmy is not anonymous. It is pseudo-anonymous. Your instance can do pretty much anything with your account up to and including turning your account into a sock puppet, and they know exactly where you're connecting from.

With that said, it's a lot better than most social media today that actively tries to violate your privacy at every turn.

[–] [email protected] 33 points 2 years ago

This is part of why I signed up through FMHY. If anybody is going to try to protect my privacy it is probably going to be the very actively pro-piracy group.

[–] [email protected] 31 points 2 years ago (3 children)

To add to this: some instances require your email address, and others don't.

Obviously there are plenty of other ways you won't be really anonymous, but if it's important to you, one step in mitigating issues is not to have an email associated with your account.

[–] [email protected] 23 points 2 years ago (1 children)

You can always use https://10minutesemail.net/ for the required email. No muss no fuss

[–] [email protected] 15 points 2 years ago

I've been partial to https://mailinator.com, but some services are getting wise to it (and blocking *@mailinator.com addresses). Thanks for sharing an alternative!

[–] Acheron 6 points 2 years ago (1 children)

What about using something like a protonmail address for all social media email?

[–] [email protected] 7 points 2 years ago (1 children)

A good strategy, but still less secure by definition than no email at all.

[–] [email protected] -2 points 2 years ago (1 children)

Iirc proton mail has a backdoor. Though they likely won't be used outside of 'nať-sećurity interests'.

[–] [email protected] -2 points 2 years ago

Guys, this is fact, also downvotes aren't private.

[–] thetreesaysbark 3 points 2 years ago* (last edited 2 years ago) (1 children)

You may know the answer to this. If I've signed up with no email, and whilst on a secure VPN, how are they going to track me?

[–] [email protected] 9 points 2 years ago* (last edited 2 years ago) (2 children)

Your instance could (edit: theoretically, if they're running custom Lemmy code) track you by your browser fingerprint (screen size, installed fonts, plugins, etc.). Others could keep a profile on you based on what you comment/post/upvote and when.

[–] seriousslayerguy 5 points 2 years ago

Screen size?! I'll just buy another monitor then.

[–] thetreesaysbark 3 points 2 years ago (1 children)

So if I'm on an app instead of a browser, that app developer would have to provide info on me too?

As for what I comment/post/upvote, that's not really what I'm asking about as that's a profile on what I do, not who I am from an identifiable point of view (correct me if I'm wrong)

[–] [email protected] 2 points 2 years ago

Depending on the content you post though, it could hypothetically be traced to you. Potentially even mundane things like mentions of geographic locations, word choices, common phrases you use, common topics -- all of those could be considered at least partly identifying in the right contexts (assuming someone was looking for it and already had info about some particular cue that indicates you).

The point is: you can't really be too careful, and realistically should assume there is always a way someone (including yourself) could be jeopardizing your privacy, if not overtly (by some kind of software or network tracking) then by holes in operational security.