Excel modeller, juggler, geek, engineer, DIY nut. Woke=thoughtful, considerate and empathetic. All views are my own.
My main issue is I’m not shutting down my Pi-Hole, home assistant, NAS etc etc just to plug in something like this in, and then 24h or so later shut them all down again to retrieve it again. That said I basically have a collection of Pis (passively cooled and this silent) and a Synology disk station so the power use is pretty low.
But they are taking about monitoring public facing social media - frankly I think it would be daft if they did not do this.
If a be teaching assistant starts publicly posting harmful harmful content there should indeed be systems on place to ensure this is identified and appropriate action taken.
If you post publicly you have to assume everybody, including your employer, might see it.
No. You might see a Mastodon user if they reply to a comment, but even that way round is not easy to do.
Kbin makes it easier to access Mastodon content while still having access to Lemmy content too… But to discover Mastodon content you are probably best making a true Mastodon account.
You’ll find different parts of the fediverse have a different focus and feel with varying levels of compatibility depending how much the core focus overlaps.
It is being discussed - here is a thread from yesterday:
https://kbin.social/m/support@lemmy.world/t/204434/Tracking-Lemmy-users-by-spy-tracker-pixels
And here is an ongoing discussion about a possible remedy:
https://github.com/LemmyNet/lemmy/pull/3550
But worth noting, unlike email the ‘view’ isn’t linked to an individual and an email address, and also broadcasting your IP address (yes and some meta data) as you browse isn’t unusual. Every page you visit could be doing this not just Lemmy.
Yes ideally this should be fixed, but in my view it is also a bit of a storm in a teacup.
In time it may become a trade-off between new (with associated features and speed) Vs tried and tested/secure.
To us now this sounds perverse, but remember that NASA generally use very old hardware because they can be more certain the various bugs & features have been found and documented. In NASA’s case this is for reliability. I’ll concede ‘brute force’ does add another dimension when applying this logic to security.
This may also become an AI arms race. Finding exploits is likely something AI could become very good at - but a better AI seeking to obfuscate?