We met here on Lemmy, of all places, believe it or not (sorry fellas, lol). I’ve never had communication so effortless. It’s like she already knows exactly what she wants to say as soon as I finish my thought (sometimes before, that’s how you know)!

After being jerked around so much over the years, I think this might finally be the one.

    • tal@lemmy.today
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      20 hours ago

      If the image has a unique name or unique-combination of images sent to any one user and is hosted on a server that the sender controls — haven’t checked — it could be an attempt to deanonymize Threadiverse users by getting their IP addresses.

      For example, say tal@lemmy.today gets https://imagehost.com/girl34720.jpg and https://imagehost.com/girl83710.jpg.

      The server can see the IP address of the client that loaded the images. The attacker knows that only tal@lemmy.today received that combination. Now the attacker knows tal@lemmy.today’s IP address.

      • qaz@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        edit-2
        19 hours ago

        Lemmy proxies access to embedded images

        But do the other frontends also do this?

        EDIT: I checked and the embedded image points to an uploaded image, however it’s hosted on another known instance (https://lemmings.world/pictrs/image/1936a27f-ff82-4ec9-9da4-2942c21ad54a.png). This means that they can’t get people’s IP’s using it unless they control the instance. The other links don’t include any identifiers either.

      • gamer@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        13 hours ago

        That’s exactly why I didn’t click any of the links in the DM. The image is safe, but external links are not.