Saik0Shinigami

joined 1 year ago
[–] [email protected] 2 points 1 week ago (1 children)

This is already a risk whether via the existing thumbnail storage

Not anymore. You can opt out of it for the most part.

# Leave images unchanged, don't generate any local thumbnails for post urls. Instead the the
# Opengraph image is directly returned as thumbnail
"None"

[–] [email protected] 2 points 1 week ago (3 children)

Yeah that was 19.4. It's doesn't proxy everything unless explicitly set to. Just thumbnails I believe. But I could be wrong. And many instance owners would be allergic to that as it leaves them on the hook for storing content. For example... someone posts CSAM... a copy of that is now on your server. You get police raided and you're fucked.

https://github.com/LemmyNet/lemmy/blob/705e86eb4c0079d0775f0c1490968f1183095fcc/config/defaults.hjson#L51

Actually going over it briefly looks like it has a few available options for what it will cache...

I refuse to enable it myself for the above reason. I would venture 99% of instances out there would also refuse for liability and bandwidth costs.

[–] [email protected] 1 points 1 week ago

Can you see which communities I follow?

Wouldn't need to see it directly. If someone was to tag enough posts they could deduce it over time. Eg, I could post on every community on every lemmy in the fediverse and over time I can be reasonably sure which communities you follow as you'd see these post in your feed and tracking images would populate your view of them as you scrolled. Would take very little automation to do it.

Which feeds I watch (and when I do that)?

Yes.. because it's possible to use "normal" images to track who's downloading those images, what addresses/user agent/referrers over time is powerful. After enough time, it's entirely possible to deduce which feeds/communities you're watching. Eg, if I post 10 different items, and 3 of them come back to your specific IP address, I would have a really good estimate on which feeds you're likely on. Do this at scale and I bet you could deduce it completely and probably with much less time and hassle than you're thinking. Hell because of my reverse proxy I can see EVERYONE who loads my profile picture. I see ALL the users to run into my posts on complete fucking accident. Lemmy loads /inbox to pull that data.

Hell this is the core reason why everyone pushes back on 3rd party cookies these days. It made this tracking trivial. Tagging every page with some image or asset that forces a connection is effectively the same thing.

Who I interact with through DMs?

I've already stated clearly that this would be the hardest thing. Just because there's one or 2 things that would be hard or impossible to obtain (even over time) passively or as a complete outsider doesn't make the rest of the argument wrong. All it would take is either site operator to leak the data, any type of MITM, etc... to leak the plaintext content of your DMs. Hell federation leaks where it sends data outside of the expected subscribers has happened. Then you have to also realize that many instances use services like Cloudflare or other WAF solutions to stop DDOS's and such.... Those nodes can read the plaintext DMs and all federation data. Any malicious actor that manages to break any single part of the chain has access to it all... and it can be quite trivial in many instances to do so.

The Lemmy system is not "secure". It's not meant to be. Everything on the fediverse is public and all of your actions here are trackable by many parties in many ways even outside of the operators of both ends of the federation action itself. Including how you're connecting and using the system.

DMs alone, and actual hashed passwords are not really needed for a third party threat to act malicious and get all of the aggregated data they'd ever want. You pointed out specifics, I answered those specifics. Then you pivoted to other shit that I ALREADY outlined. This argument is super disingenuous.

[–] [email protected] 3 points 1 week ago (6 children)

Source for what in specific?

That stopping processes is a kernel action? Go ahead. Open powershell and ask it to close some other system process... The UAP prompt (if you're on windows, linux will just fail silently most of the time unless you sudo or are root) that shows up is the kernel validating that you even have permissions to do that. The kernel handles ALL task scheduling/management. When you close something you're asking the kernel to do it. The kernel also handles ALL file management and driver management (drivers being extensions of the kernel). So the fact that it can read other active DLLs and such hooked into other processes (say your graphics drivers) is literally proof.

That industry agrees that it's malware? Depends on which part of industry I suppose. But if it's able to do all these actions at the kernel level, and attached itself it to other software to install, often doesn't uninstall when you remove the game it was attached to, AND gets flagged by anti-viruses that don't have it whitelisted yet... It's definitionally malware. Go search for "Is malware". Very few people will argue that they're not.

Hell it's possible for anti-cheats to write to UEFI if they really wanted to. There's no legitimate reason for that level of access, 0, none.

[–] [email protected] 1 points 1 week ago (2 children)

I've addressed the points you've brought up. I run my own instance. I can collect just about everything in the DB tables I've seen without being logged into the instance with some external work.

Are you trying to get my point? If you have a specific item that you believe is stored on a lemmy server that you think isn't possible to obtain. I'm all ears. otherwise I think this conversation is done. This kind of response is pointless and I'm not interested in continuing if you're going to act like that.

The hardest thing to collect would be private messages, and login information (which is hashed btw, so even your server operator doesn't really know it). But messages are plaintext and openly federated. All the other information is really really easy to collect through other means.

[–] [email protected] 9 points 1 week ago

They have kernel access... They can control anything since they're in the kernel. And yes, I've seen it.

If you remember back in the late 2000's early 2010's there were a boatload of apps that would hook into games to do things like display overlays for chats (Teamspeak for example, overwolf as another.) some kernel anti-cheats would stop those processes from starting up.

But don't take my word for it.


https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/

I'm less worried about developers abusing kernel access, and more concerned with potential vulnerabilities introduced for third-party actors to exploit. Rigney cited two examples: the infamous Extended Copy Protection (XCP) from Sony, which bad actors used to compromise affected systems, as well as a backdoor vulnerability introduced by Street Fighter 5's kernel level anticheat. In 2022, a ransomware developer also took advantage of Genshin Impact's kernel level anticheat to disable antivirus processes.

Introduces backdoors to be used by malicious actors.


https://www.pcgamer.com/the-controversy-over-riots-vanguard-anti-cheat-software-explained/

Vanguard detects software with vulnerabilities which could be exploited by cheat makers, and blocks some of it.

Blocks external softwares that it deems "vulnerable"


https://old.reddit.com/r/gaming/comments/xf1cwr/the_insanity_of_eas_anticheat_system_by_a_kernel/

This is far from the first time that boot level firmware or kernel mode code inserted via patches or drivers have been used to install spyware, but every time I see it happen I want to warn users about the consequences, and provide some information about the danger.

Kernel devs beg users to not allow this shit.


Just look it up. All sorts of articles and experts have spoken on it.

[–] [email protected] 11 points 1 week ago (10 children)

Taking kernel level actions to stop processes on YOUR machine is absolutely taking control of the system.

Kernel level anti-cheats meet every requirement. Just because you think there's gymnastics going on doesn't make it so. It's actually well established in the security field that they count.

[–] [email protected] 10 points 1 week ago

I'm not sure that Nintendo has any pull in any Middle Eastern country or China.

But all of this is moot as the lawsuit is in the US... And Nintendo would just tell the streaming services to ban them over and over again.

[–] [email protected] 15 points 1 week ago (2 children)

that kind of threat doesn’t work when they can just tell your country to arrest you for breaking the law.

That assumes the country gives a shit. Many countries simply do not care about what Intellectual Property you "own" or created in some other country.

[–] [email protected] 1 points 1 week ago (4 children)

but that instance owners have even more, probably more valuable info, like IP addresses from which not just geolocation but also wake times, device usage patterns and other gnarly stuff could be extracted, that could - together with other personalized surveillance info (like the usual adware stuff) - be aggregated to give a bigger picture.

I have IP behind the geolocation. How do you think that I know the geolocation? It's an IP lookup. My interface that I shown in the image just doesn't publish it because I don't care personally. What I use that service for is simply to track where sensitive emails/documents go. Not to track lemmy. I don't need specific resolutions. Just to know if they leak outside of what I expected.

Device patterns? The app you use is the app you use. That would be given away via your browser header. I also collect that with the tracking image. Just once again. Not shown in the graph cause I don't care to track it personally (I'm only doing this as an example, not to actually aggregate data).

If you use lemmy over the web browser, browsers don't really give up that much information unless you're google themselves. In which case apparently chrome gives up a boatload of information to google's domains.

not-so-public information

You'd have to give me an example of any of what you're referencing. I can collect IP, web headers, access times, and if I tag enough pages or mark the image as non-cacheable could even see multiple views/accesses (you see views higher than actual visitors) I can track your movement across all of the fediverse.

that one can get some info about me through my (public) actions

Simply "viewing" the page (which pulls the image and is not necessarily "public") is a direct rebuttal to obtaining data that isn't "public".

[–] [email protected] 20 points 1 week ago (19 children)

Malware isn’t defined by its privileges but what it does.

Correct... and anything that intercepts all system calls and forces closed applications that it deems "not safe" even if I the user specifically run it is malware. You bet your ass they feed back information to the mothership too.

And btw, if you're accepting the "Spyware" moniker from the other comment chain. Spyware is a form/category of malware.

Definition from Malwarebytes:

Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device’s operations.

Hostile - it's not meant to help you at all. If you're doing something deemed "unsafe" in their eyes. They will take action up to and including stealing your money that you paid for the game. intrusive - embeds itself in the kernel Intentionally nasty - Well it's not accidentally nasty.

invade - attached to games with little to no input on what you're installing. disable computer systems - specifically the software you paid for Taking partial control over a device's operations - the whole fucking kernel.

I'd say meeting the VAST majority of the definition and at least one portion of each category is sufficient to call them all malware.

[–] [email protected] 6 points 1 week ago (11 children)

Yeah it’s so simple to just live wherever you want

It is when you hold multiple citizenships. You tend to have more options if you're considered native in multiple countries. You should have read the article.

view more: ‹ prev next ›