Hello,

Since your Lemmy posts, comments, related activities, and your basic profile information will be stored in the databases across the fediverse, possibly never to be deleted (or kept by somebody who can), do you:

  1. Always use Tor/VPN with a fediverse app?
  2. Recommend others do the same?

If you feel that it is unnecessary, why do you feel that way? If you think it is necessary, why so?

Thanks. I am trying to get a feel of what I should do. For example, if my instance loses its data (due to a hack, sale, vulnerability, etc.), I am pretty sure all the information is lost (including my IP addresses). If other instances lose their data, or keep the data for their own purposes, then my posts/comments/related activities are lost (maybe excluding some of my profile information, my settings, and my IP addresses).

I look forward to hearing your thoughts.

    • fermuch@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Would that be possible? How would other (normal network) instances federate with you?

    • Yeah2206@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      1 year ago

      Also, isn’t onion service pretty much used to hide the server’s IP, but doesn’t do much about hiding anything for the end users?

      • LedgeDrop@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        The end user’s ip is hidden in the onion network. The server will get the ip address of the “last node” your client routed it’s request through (and that node only has the ip address of the previous node, etc).

        However, the clients ip can be leaked if a server creates some Javascript which makes an Ajax call (basically, an additional http request). A malicious Ajax call will not go through the onion network and thus expose the clients real ip. Hence, it’s recommended to disable Javascript and other features while using tor.

        • jayknight@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          If you have all your traffic going through tor, ajax requests will come from an exit node too.

          • LedgeDrop@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            I did a bit more homework and you’re right.

            “Back in the day” running Javascript increased your attack area. But now-a-days I guess it’s consider “safe”.

            I did find this old (7 years ago) posting which talked about concerns. Today, I guess the rule of thumb is to avoid (or limit) browser plugins.

            Thank you clarify that.