As we are concerned about privacy, I am curious just to understand if lemmy can be at some point exploited by someone to profile its users.

  • @[email protected]
    link
    fedilink
    English
    31 year ago

    This all happens before the database even gets asked for information. The web server will make a log of the requests as they come in before responding.

    At minimum the web server needs to know where to send the data back to.