this post was submitted on 07 Jul 2023
897 points (99.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54565 readers
587 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 120 points 1 year ago (2 children)

Now is a good time to remind users that you are placing some trust in the instance that you use. Lemmy is not anonymous. It is pseudo-anonymous. Your instance can do pretty much anything with your account up to and including turning your account into a sock puppet, and they know exactly where you're connecting from.

With that said, it's a lot better than most social media today that actively tries to violate your privacy at every turn.

[–] [email protected] 32 points 1 year ago

This is part of why I signed up through FMHY. If anybody is going to try to protect my privacy it is probably going to be the very actively pro-piracy group.

[–] [email protected] 31 points 1 year ago (3 children)

To add to this: some instances require your email address, and others don't.

Obviously there are plenty of other ways you won't be really anonymous, but if it's important to you, one step in mitigating issues is not to have an email associated with your account.

[–] [email protected] 22 points 1 year ago (1 children)

You can always use https://10minutesemail.net/ for the required email. No muss no fuss

[–] [email protected] 14 points 1 year ago

I've been partial to https://mailinator.com, but some services are getting wise to it (and blocking *@mailinator.com addresses). Thanks for sharing an alternative!

[–] [email protected] 6 points 1 year ago (1 children)

What about using something like a protonmail address for all social media email?

[–] [email protected] 7 points 1 year ago (1 children)

A good strategy, but still less secure by definition than no email at all.

[–] [email protected] -2 points 1 year ago (1 children)

Iirc proton mail has a backdoor. Though they likely won't be used outside of 'nať-sećurity interests'.

[–] [email protected] -2 points 1 year ago

Guys, this is fact, also downvotes aren't private.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (1 children)

You may know the answer to this. If I've signed up with no email, and whilst on a secure VPN, how are they going to track me?

[–] [email protected] 9 points 1 year ago* (last edited 1 year ago) (2 children)

Your instance could (edit: theoretically, if they're running custom Lemmy code) track you by your browser fingerprint (screen size, installed fonts, plugins, etc.). Others could keep a profile on you based on what you comment/post/upvote and when.

[–] [email protected] 5 points 1 year ago

Screen size?! I'll just buy another monitor then.

[–] [email protected] 3 points 1 year ago (1 children)

So if I'm on an app instead of a browser, that app developer would have to provide info on me too?

As for what I comment/post/upvote, that's not really what I'm asking about as that's a profile on what I do, not who I am from an identifiable point of view (correct me if I'm wrong)

[–] [email protected] 2 points 1 year ago

Depending on the content you post though, it could hypothetically be traced to you. Potentially even mundane things like mentions of geographic locations, word choices, common phrases you use, common topics -- all of those could be considered at least partly identifying in the right contexts (assuming someone was looking for it and already had info about some particular cue that indicates you).

The point is: you can't really be too careful, and realistically should assume there is always a way someone (including yourself) could be jeopardizing your privacy, if not overtly (by some kind of software or network tracking) then by holes in operational security.