With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

  • taladar@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    I am not talking about defederation, just straight blocking of that website in a corporate or similar network if it is used to target your employees which is what watering hole attacks are all about.

    • dislocate_expansionOPB
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      Yeah, but the average internet users doesn’t understand these concepts. And with the use of “random-lemmy.random” it seems like it might be an easy attack to fall for