this post was submitted on 05 Jul 2023
62 points (93.1% liked)
Comradeship // Freechat
2166 readers
51 users here now
Talk about whatever, respecting the rules established by Lemmygrad. Failing to comply with the rules will grant you a few warnings, insisting on breaking them will grant you a beautiful shiny banwall.
A community for comrades to chat and talk about whatever doesn't fit other communities
founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
To be clear, if I'm the operator of the Linux server on which Lemmy is deployed, I can use tools like tcpspy to pull information about the TCP/IP connections to my server on a given port. Obviously, this is simply the TCP/IP packets, which is going to be a sea of bots, internet crawlers, and other automated systems attempting to access my box because it's on the internet, which will likely dwarf the legitimate connections to the box.
I guess it's more likely though, you'll be monitoring the box between the outside internet and the actual server (like an Nginx reverse proxy) but I could probably extract which IPs were going to Mylemmy.ml instead of my boxes IP address directly, but that's outside the scope of my knowledge. I simply know that, once you own the box that someone else is connecting to, there is networking data you now have access to that can lead to identifying a person.
Do you know if this would work if I viewed information on that instance/server through Lemmygrad? I.e. could the other instance associate my IP with my LG account even if LG doesn't collect that data?
Content is effectively "Synced" to Lemmygrad. So if you are reading something from [email protected], you're actually reading it from the Lemmygrad server located at lemmygrad.ml/c/[email protected]. So no, unless you are connecting to their domain address explicitly, those domains are not getting your TCP/IP connection.
I'll note, this is why you should probably use a VPN to access the internet generally if you are concerned about privacy.
Using a VPN means all your ISP/Mobile provider sees is you sending data to a VPN server over HTTPS, and that's it. Services like NordVPN claim they do not keep logs on their system, and so if a government was to request your account's history, they likely can't provide that. They operate a Warrant Canary, here which in principle should give you faith that they have upheld that mission statement.
I use Nord on my phone and via their browser extension, and I have them set to auto-connect so they never turn off, and use their local discovery and bypass features to allow list sites and local services that get angry about my devices being on a VPN. I've been doing this for maybe two years now, and I've never noticed any material impact on the quality and speed of my connection.
This is not an ad for Nord 😅, I just think they're practicing what they preach.
That's reassuring to know.
I would assume that security services can log everything even for VPN users. Plus, as Sakai observes, relying on technology for the security of revolutionaries is only part of the solution. The main risk comes from other people (who may appear to be comrades but are spies).
The state isn't the only one to be worried about, though. With reactionary politics sliding into open fascism more and more, there are ordinary members of the public who don't have access to the same powers as the state but who could get access to similar data if we're not careful.
One thing I've always wondered is whether using a VPN puts you in a list for trying to hide your internet activity. They're paranoid. I'm paranoid. It's the age of paranoia!