For those not familiar, there are numerous messages containing images being repeatedly spammed to many Threadiverse users talking about a Polish girl named “Nicole”. This has been ongoing for some time now.

Lemmy permits external inline image references to be embedded in messages. This means that if a unique image URL or set of image URLs are sent to each user, it’s possible to log the IP addresses that fetch these images; by analyzing the log, one can determine the IP address that a user has.

In some earlier discussion, someone had claimed that local lemmy instances cache these on their local pict-rs instance and rewrite messages to reference the local image.

It does appear that there is a closed issue on the lemmy issue tracker referencing such a deanonymization attack:

https://github.com/LemmyNet/lemmy/issues/1036

I had not looked into these earlier, but it looks like such rewriting and caching intending to avoid this attack is not occurring, at least on my home instance. I hadn’t looked until the most-recent message, but the image embedded here is indeed remote:

https://lemmy.doesnotexist.club/pictrs/image/323899d9-79dd-4670-8cf9-f6d008c37e79.png

I haven’t stored and looked through a list of these, but as I recall, the user sending them is bouncing around different instances. They certainly are not using the same hostname for their lemmy instance as the pict-rs instance; this message was sent from nicole92 on lemmy.latinlok.com, though the image is hosted on lemmy.doesnotexist.club. I don’t know whether they are moving around where the pict-rs instance is located from message to message. If not, it might be possible to block the pict-rs instance in your browser. That will only be a temporary fix, since I see no reason that they couldn’t also be moving the hostname on the pict-rs instance.

Another mitigation would be to route one’s client software or browser through a VPN.

I don’t know if there are admins working on addressing the issue; I’d assume so, but I wanted to at least mention that there might be privacy implications to other users.

In any event, regardless of whether the “Nicole” spammer is aiming to deanonymize users, as things stand, it does appear that someone could do so.

My own take is that the best fix here on the lemmy-and-other-Threadiverse-software-side would be to disable inline images in messages. Someone who wants to reference an image can always link to an external image in a messages, and permit a user to click through. But if remote inline image references can be used, there’s no great way to prevent a user’s IP address from being exposed.

If anyone has other suggestions to mitigate this (maybe a Greasemonkey snippet to require a click to load inline images as a patch for the lemmy Web UI?), I’m all ears.

11 points
*
Deleted by creator
permalink
report
reply
10 points

VPNs are a condom for the internet

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
2 points

Who disapproves of condoms? Y’all out here raw dogging the internet like damn fools

permalink
report
parent
reply
6 points

OK, I’m in. What’s a reputable one?

permalink
report
parent
reply
20 points

Mullvad

permalink
report
parent
reply
10 points
*
Deleted by creator
permalink
report
parent
reply
11 points

Ivpn, Proton, or mullvad

permalink
report
parent
reply
3 points

I use proton on my phone, very simple, eat to use, completely free, only downside to the free version is you have to reconnect every two or three hours.

permalink
report
parent
reply
1 point

Or tor, if you need a solution that doesn’t cost anything.

permalink
report
parent
reply
-7 points

IP addresses are fairly worthless

permalink
report
reply
5 points

How so?

permalink
report
parent
reply
-1 points

It doesn’t provide much information since your IP address is probably not static. It rotates and thanks to NAT it is probably shared.

permalink
report
parent
reply
5 points

That’s only true for a subset of people, possibly a very small one. My IP stays for months at a time.

permalink
report
parent
reply
14 points

Unless it’s a state actor.

permalink
report
parent
reply
5 points
*

That’s fair

However, a state actor probably has more effective means. It is really speculation at this point. It would be nice if someone did a full investigation.

permalink
report
parent
reply
3 points
*

stop it you’re scaring me

permalink
report
parent
reply
21 points
*

I mean, it (hopefully) shouldn’t let someone compromise a system remotely, but:

  • For those of you who have used IRC networks that didn’t mask IP addresses, people getting in flamewars proceeding to then DDoSing each other is a fundamental issue. If someone wants to do something at low latency, like play real-time video games, this is a particularly obnoxious way to disrupt them.

  • IP addresses can often be correlated across databases, even by random members of the public. I remember someone running another bot that would map IP addresses to BitTorrent downloads, for example.

End of the day, the Lemmy security model is “someone can see the username you choose to expose, but not IP address”. If the IP address is intended to be exposed, then might as well just stick it right next to the username. If it isn’t, then one shouldn’t let users be able to trivially-obtain it by pulling a direct-message stunt.

permalink
report
parent
reply
-3 points
*

You as a user can not just DDoS someone. Modern connections a way faster and modern network hardware with drop packets that are taking up to much bandwidth. You are also behind a firewall and probaby a NAT which will drop random incoming packets.

The modern internet is full of bots scanning. If that doesn’t destroy your connection chances are some random internet person can’t either.

permalink
report
parent
reply
5 points

If you have a 50mb/s connection, surely someone sending you 100mbs of data would fill your line? The firewall is on your router, so the line to it would be maxed?

permalink
report
parent
reply
6 points

LMAO yea, if you’re actually talking about good hardware, the average person though is using some consumer grade crapware their ISP shoves out by the thousands that doesn’t take all that much to overload

permalink
report
parent
reply
4 points
*

You as a user can not just DDoS someone. Modern connections a way faster and modern network hardware with drop packets that are taking up to much bandwidth.

You know, I thought about responding to this point by point, but I just don’t have the energy.

I’ll just say that I don’t agree, and I think that if you want to go looking, you’ll find that this certainly is not the case.

permalink
report
parent
reply
-3 points
Deleted by creator
permalink
report
reply
18 points

umatrix is unmaintained and thus solves nothing anymore, unfortunately.

permalink
report
parent
reply
4 points

It still works. It can do almost everything uBlock Origin can do, and some things it can’t. I use them both together, but uMatrix is the one I would never do without.

permalink
report
parent
reply
3 points

Are there any umatrix alternatives?

permalink
report
parent
reply
5 points

in my understanding, there was enough overlap between uBlock Origin and uMatrix that the developer didn’t want/felt it wasn’t worth to continue maintaining both.

I’m not too expert on both extensions, but maybe the functionality difference can be covered by NoScript or by using uBlock Origin with LibreWolf or some other combination.

permalink
report
parent
reply
27 points

On my instance (.ml) all of the images are fetched through the image proxy.

What version of lemmy is your instance running?

permalink
report
reply
23 points

0.19.6. Could be that there’s some configuration option.

permalink
report
parent
reply
72 points

We used to do this on the EVE online forums until CCP caught on and banned inline images.

permalink
report
reply
2 points

Some days, I am tempted to go back to playing eve. Ive got some good memories.

permalink
report
parent
reply
47 points

“Man, everyone is on planet earth. How boring”

permalink
report
parent
reply
81 points

We were using the IPs and post times to identify accounts, then checking IPs that connected to our VOIP servers so we could identify spies and either remove them or feed them false intel.

Basic counter-intel work and all for a video game heh.

permalink
report
parent
reply
22 points

Jesus i miss that time , counter intel was so easy back then

permalink
report
parent
reply
9 points

This sounds super cool and interesting, is there like a wiki I can read up about that stuff??

permalink
report
parent
reply
4 points

spy

rho s quad best quad

permalink
report
parent
reply

Privacy

!privacy@lemmy.world

Create post

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

Community stats

  • 1.5K

    Monthly active users

  • 452

    Posts

  • 3.8K

    Comments

Community moderators