With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

  • dislocate_expansionOPB
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    The quick defederarion option is a nice defense. Could be some damage in the meantime though

    • taladar@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      I am not talking about defederation, just straight blocking of that website in a corporate or similar network if it is used to target your employees which is what watering hole attacks are all about.

      • dislocate_expansionOPB
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        Yeah, but the average internet users doesn’t understand these concepts. And with the use of “random-lemmy.random” it seems like it might be an easy attack to fall for