- cross-posted to:
- lemmyshitpost
- [email protected]
- cross-posted to:
- lemmyshitpost
- [email protected]
We met here on Lemmy, of all places, believe it or not (sorry fellas, lol). I’ve never had communication so effortless. It’s like she already knows exactly what she wants to say as soon as I finish my thought (sometimes before, that’s how you know)!
After being jerked around so much over the years, I think this might finally be the one.
Huh, wonder what the scam is?
If the image has a unique name or unique-combination of images sent to any one user and is hosted on a server that the sender controls — haven’t checked — it could be an attempt to deanonymize Threadiverse users by getting their IP addresses.
For example, say [email protected] gets https://imagehost.com/girl34720.jpg and https://imagehost.com/girl83710.jpg.
The server can see the IP address of the client that loaded the images. The attacker knows that only [email protected] received that combination. Now the attacker knows [email protected]’s IP address.
Lemmy proxies access to embedded images
…
But do the other frontends also do this?
EDIT: I checked and the embedded image points to an uploaded image, however it’s hosted on another known instance (
https://lemmings.world/pictrs/image/1936a27f-ff82-4ec9-9da4-2942c21ad54a.png
). This means that they can’t get people’s IP’s using it unless they control the instance. The other links don’t include any identifiers either.That’s exactly why I didn’t click any of the links in the DM. The image is safe, but external links are not.