With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?
With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?
You mean for users of that instance or for other instances?
Either or. Would be more nefarious to have users sign up for a malicious instance unknowingly and then federate with non malicious instances
Something to consider would be to compare this to the walled gardens, say Facebook. Is that a malicious ‘instance’?
And then what is the chance to register on a malicious one in the fediverse?