Probably should assume everything will be leaked, anyone using Tor/VPN for Fediverse apps? - eviltoast

Hello,

Since your Lemmy posts, comments, related activities, and your basic profile information will be stored in the databases across the fediverse, possibly never to be deleted (or kept by somebody who can), do you:

  1. Always use Tor/VPN with a fediverse app?
  2. Recommend others do the same?

If you feel that it is unnecessary, why do you feel that way? If you think it is necessary, why so?

Thanks. I am trying to get a feel of what I should do. For example, if my instance loses its data (due to a hack, sale, vulnerability, etc.), I am pretty sure all the information is lost (including my IP addresses). If other instances lose their data, or keep the data for their own purposes, then my posts/comments/related activities are lost (maybe excluding some of my profile information, my settings, and my IP addresses).

I look forward to hearing your thoughts.

  • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 ℹ️@yiffit.net
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    I just don’t care?

    I know that stuff is public when I used it.

    I’ve known this is how the internet works since the 90’s. I’ve also known that my IP address isn’t a scary super identifying thing as the movies would make you believe. For most people, it’s gonna point to your ISP and not your personal device.

    Shit man, back in the day we used to scare noobs by showing them their own IP because it was incredibly easy to obtain. It still is, most of the time. Because it doesn’t mean fuck all.

    As for everything else: If you don’t want certain pieces of information out in the wild… Don’t put them there in the first place. It’s that simple.

  • saigot@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    What data does Lemmy store that isn’t already inherently public. Private DMs and IPs are all I can think of, and neither of those are of any value as far as I’m concerned.

    • Yeah2206@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Also, isn’t onion service pretty much used to hide the server’s IP, but doesn’t do much about hiding anything for the end users?

      • LedgeDrop@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        The end user’s ip is hidden in the onion network. The server will get the ip address of the “last node” your client routed it’s request through (and that node only has the ip address of the previous node, etc).

        However, the clients ip can be leaked if a server creates some Javascript which makes an Ajax call (basically, an additional http request). A malicious Ajax call will not go through the onion network and thus expose the clients real ip. Hence, it’s recommended to disable Javascript and other features while using tor.

        • jayknight@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          If you have all your traffic going through tor, ajax requests will come from an exit node too.

          • LedgeDrop@lemm.ee
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            I did a bit more homework and you’re right.

            “Back in the day” running Javascript increased your attack area. But now-a-days I guess it’s consider “safe”.

            I did find this old (7 years ago) posting which talked about concerns. Today, I guess the rule of thumb is to avoid (or limit) browser plugins.

            Thank you clarify that.