this post was submitted on 19 Apr 2024
15 points (77.8% liked)

Asklemmy

43892 readers
1084 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
 

With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

you are viewing a single comment's thread
view the rest of the comments
[โ€“] dislocate_expansion@reddthat.com 2 points 6 months ago* (last edited 6 months ago) (1 children)

That's a different conversation. I'm talking about an adversary who just creates a Lemmy instance and has malicious code embedded in the images, videos and text

What does that have to do with any corporation? Facebook specifically is already in a lawsuit this last month about installing malicious Root Certificates and performing man in the middle attacks against Amazon and Google, so I'm not sure what you're asking

[โ€“] xilliah@beehaw.org 1 points 6 months ago

Alright I think I misunderstood then.