Lemmy - RazBot

8 readers
0 users here now

This instance is hosted in the UK.

Rules:

Offered Lemmy Frontends:

Status Information:

The status page is status.razbot.xyz.
All lemmy related services run on the "Raz Dedicated Server" and the "Lemmy Instance" is lemmy.razbot.xyz, which runs on the dedi, but the uptime monitor checks that the actual page is loading correctly.

Donations

If you want to donate, I have a paypal link here.

founded 2 years ago
ADMINS
1
2
 
 

The Trump administration’s Federal Trade Commission has removed four years worth of business guidance blogs as of Tuesday morning, including important consumer protection information related to artificial intelligence and the agency’s landmark privacy lawsuits under former chair Lina Khan against companies like Amazon and Microsoft. More than 300 blogs were removed.

3
 
 

Amazon has used tricks, algorithms, and surveillance to discourage warehouse employees from unionizing, according to a paper published in the journal Socius.

4
5
 
 

cross-posted from: https://lemmy.today/post/25826615

For those not familiar, there are numerous messages containing images being repeatedly spammed to many Threadiverse users talking about a Polish girl named "Nicole". This has been ongoing for some time now.

Lemmy permits external inline image references to be embedded in messages. This means that if a unique image URL or set of image URLs are sent to each user, it's possible to log the IP addresses that fetch these images; by analyzing the log, one can determine the IP address that a user has.

In some earlier discussion, someone had claimed that local lemmy instances cache these on their local pict-rs instance and rewrite messages to reference the local image.

It does appear that there is a closed issue on the lemmy issue tracker referencing such a deanonymization attack:

https://github.com/LemmyNet/lemmy/issues/1036

I had not looked into these earlier, but it looks like such rewriting and caching intending to avoid this attack is not occurring, at least on my home instance. I hadn't looked until the most-recent message, but the image embedded here is indeed remote:

https://lemmy.doesnotexist.club/pictrs/image/323899d9-79dd-4670-8cf9-f6d008c37e79.png

I haven't stored and looked through a list of these, but as I recall, the user sending them is bouncing around different instances. They certainly are not using the same hostname for their lemmy instance as the pict-rs instance; this message was sent from nicole92 on lemmy.latinlok.com, though the image is hosted on lemmy.doesnotexist.club. I don't know whether they are moving around where the pict-rs instance is located from message to message. If not, it might be possible to block the pict-rs instance in your browser. That will only be a temporary fix, since I see no reason that they couldn't also be moving the hostname on the pict-rs instance.

Another mitigation would be to route one's client software or browser through a VPN.

I don't know if there are admins working on addressing the issue; I'd assume so, but I wanted to at least mention that there might be privacy implications to other users.

In any event, regardless of whether the "Nicole" spammer is aiming to deanonymize users, as things stand, it does appear that someone could do so.

My own take is that the best fix here on the lemmy-and-other-Threadiverse-software-side would be to disable inline images in messages. Someone who wants to reference an image can always link to an external image in a messages, and permit a user to click through. But if remote inline image references can be used, there's no great way to prevent a user's IP address from being exposed.

If anyone has other suggestions to mitigate this (maybe a Greasemonkey snippet to require a click to load inline images as a patch for the lemmy Web UI?), I'm all ears.

6
7
8
 
 
9
 
 

Computer scientist Stephen Thaler again told his 'Creativity Machine' can't earn a ©

10
11
12
13
 
 
14
105
submitted 3 hours ago* (last edited 3 hours ago) by [email protected] to c/[email protected]
 
 

Google recently open sourced Pebble and today, Repebble has put some of the watches up for preorder.

15
 
 

The "normal" everyone is wishing for was killing us. You just didn't notice.

Let it rot.

16
 
 

Today, President Trump illegally attempted to fire FTC Commissioners Rebecca Kelly Slaughter and Alvaro Bedoya in a direct assault on the federal government’s foremost defender of consumers. The President’s order threatens to shred the Federal Trade Commission’s independence and stifle its ability to protect consumers, promote competition, and rein in Big Tech’s abuses.

17
 
 
18
 
 

Put me down as scared and horny

19
 
 
20
21
 
 

I got 30 beers with your name on it exhaustion.

22
 
 
23
 
 

Is there still room on people's wrists for the most exciting Kickstarter-backed tech of 2012–2016?

24
 
 

“It is what is it is” is such a go to automatic response that I’m working on getting past

25
view more: next ›