this post was submitted on 07 Jul 2023
884 points (99.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

55099 readers
331 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] MBM@lemmings.world 9 points 1 year ago* (last edited 1 year ago) (2 children)

Your instance could (edit: theoretically, if they're running custom Lemmy code) track you by your browser fingerprint (screen size, installed fonts, plugins, etc.). Others could keep a profile on you based on what you comment/post/upvote and when.

Screen size?! I'll just buy another monitor then.

[–] thetreesaysbark@sh.itjust.works 3 points 1 year ago (1 children)

So if I'm on an app instead of a browser, that app developer would have to provide info on me too?

As for what I comment/post/upvote, that's not really what I'm asking about as that's a profile on what I do, not who I am from an identifiable point of view (correct me if I'm wrong)

[–] circuitfarmer@lemmy.sdf.org 2 points 1 year ago

Depending on the content you post though, it could hypothetically be traced to you. Potentially even mundane things like mentions of geographic locations, word choices, common phrases you use, common topics -- all of those could be considered at least partly identifying in the right contexts (assuming someone was looking for it and already had info about some particular cue that indicates you).

The point is: you can't really be too careful, and realistically should assume there is always a way someone (including yourself) could be jeopardizing your privacy, if not overtly (by some kind of software or network tracking) then by holes in operational security.