Is there a way to shop around for a Lemmy instance based on how many instances are blocking it and how many instances it’s blocking? For example, I noticed that the lemmygrad.ml instance is relatively popular, but it seems like a lot of other instances block it. It also blocks a bunch of other instances. So, if there are any communities on there that might be relevant to me then I would be missing out. I guess I could just create an account on a walled instance, but I would prefer not to keep creating accounts. I’d like to just find one instance that maximizes my access. Is the answer to just run my own instance?

  • Andreas
    link
    fedilink
    131 year ago

    Some decently sized Mastodon instances introduced a policy like this. “Unless you use my blacklist, you are defederated by default”. In practice, it means that those few instances are an isolated clique that only talk to each other. In my experience, those cliques are toxic, so it’s no big loss if you’re not able to contact them. But of course I hope this behavior doesn’t come to Lemmy.

    • @[email protected]
      link
      fedilink
      31 year ago

      I can see the issue but at the same time is scary. In the future this thing could be bad. Like who is drawing the line and where?

      • Andreas
        link
        fedilink
        151 year ago

        No one draws the line unfortunately, because no one controls the entire federated network. This is why it’s important to have many medium-sized instances on the Fediverse and not one massive instance and a bunch of other tiny ones, so one instance won’t get too much control and impose their rules on the entire network. But it’s difficult to convince non-tech users of this concept since they are used to centralized social media and will just sign up on the biggest instance.

      • Andreas
        link
        fedilink
        21 year ago

        On the free speech and shitposting Fediverse instances, they get around this by screenshotting posts from blocked instances. I believe there are also some implementations that can bypass fetching authorization and fetch public content from instances that have blocked them. If something is posted publicly on the internet, it can be distributed further, so I don’t see why they should use this halfway solution that fragments the network without actually increasing the instance’s security (e.g. make the instance private and verify signups).