With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

    • taladar@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      7 months ago

      I am not talking about defederation, just straight blocking of that website in a corporate or similar network if it is used to target your employees which is what watering hole attacks are all about.

      • dislocate_expansion@reddthat.comOPB
        link
        fedilink
        arrow-up
        1
        ·
        6 months ago

        Yeah, but the average internet users doesn’t understand these concepts. And with the use of “random-lemmy.random” it seems like it might be an easy attack to fall for