This may look like a weird question btw.

I see constantly people here worried about digital security, I see people using Tor, deleting social networks, and just sharing the different levels of security that they use.

So I was wondering, how safe is Lemmy? Sure it doesnt collect info like Twitter and Meta does, but that doesnt mean its 100% safe. So what are the main problems we can have here? Is there anything the 3 letter agencies could exploit? Is there any preventive measures users could take?

  • @holdengreen
    link
    22 years ago

    Use diceware for root keys. https://diceware.dmuth.org/ is a nice demonstration but you should use physical dice.

    If you are on a mobile machine then isn’t it inconvenient to have to use a specially configured router? What do you do?

    • nixfreak
      link
      22 years ago

      I guess I don’t understand the context. Let me ask , are you asking what do you if you’re using a mobile device and don’t have access to a router?

      • @holdengreen
        link
        22 years ago

        I’m saying let’s say your device is already configured to run Tor. But then you go out somewhere and want to connect to wifi of a business or relative who’s router you don’t own.

        • nixfreak
          link
          3
          edit-2
          2 years ago

          Ok , so there is a really cool product called , tailsscale https://tailscale.com/ This is amazing , basically you can install this on any computer or server and mobile device. It is a p2p VPN , real quick … example… I install this on my home server right , then I install another client on a mobile device like a phone. I can now connect to my server IP’s address on my server. I have this setup also.

          • @holdengreen
            link
            22 years ago

            It wants your email and stuff to sign up tho…

            • nixfreak
              link
              22 years ago

              yeah that’s fine, the reason why you need an email is because that is what your using for your domain. so for instance only users with @welcome.to will be allowed to access my VPN.

              • @holdengreen
                link
                12 years ago

                But it seems to want Google. And that’s easy linked to name address and stuff right.