this post was submitted on 19 Apr 2024
15 points (77.8% liked)

Asklemmy

42525 readers
992 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 19 points 2 months ago (3 children)

There isn't. However, Lemmy or other Fediverse applications are no different from any other website in that respect. The main difference is that the bit

One of the most significant dangers of watering hole attacks is that they are executed via legitimate websites that are unable to be easily blacklisted

is not really true in the Fediverse. You could easily block a single infected instance once it is detected that your employees are attacked via malware on that instance.

[โ€“] [email protected] 1 points 2 months ago (1 children)

The quick defederarion option is a nice defense. Could be some damage in the meantime though

[โ€“] [email protected] 1 points 2 months ago (1 children)

I am not talking about defederation, just straight blocking of that website in a corporate or similar network if it is used to target your employees which is what watering hole attacks are all about.

[โ€“] [email protected] 1 points 2 months ago

Yeah, but the average internet users doesn't understand these concepts. And with the use of "random-lemmy.random" it seems like it might be an easy attack to fall for

load more comments (1 replies)