this post was submitted on 18 Mar 2025
261 points (97.8% liked)

Privacy

5448 readers
416 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 2 years ago
MODERATORS
 

For those not familiar, there are numerous messages containing images being repeatedly spammed to many Threadiverse users talking about a Polish girl named "Nicole". This has been ongoing for some time now.

Lemmy permits external inline image references to be embedded in messages. This means that if a unique image URL or set of image URLs are sent to each user, it's possible to log the IP addresses that fetch these images; by analyzing the log, one can determine the IP address that a user has.

In some earlier discussion, someone had claimed that local lemmy instances cache these on their local pict-rs instance and rewrite messages to reference the local image.

It does appear that there is a closed issue on the lemmy issue tracker referencing such a deanonymization attack:

https://github.com/LemmyNet/lemmy/issues/1036

I had not looked into these earlier, but it looks like such rewriting and caching intending to avoid this attack is not occurring, at least on my home instance. I hadn't looked until the most-recent message, but the image embedded here is indeed remote:

https://lemmy.doesnotexist.club/pictrs/image/323899d9-79dd-4670-8cf9-f6d008c37e79.png

I haven't stored and looked through a list of these, but as I recall, the user sending them is bouncing around different instances. They certainly are not using the same hostname for their lemmy instance as the pict-rs instance; this message was sent from nicole92 on lemmy.latinlok.com, though the image is hosted on lemmy.doesnotexist.club. I don't know whether they are moving around where the pict-rs instance is located from message to message. If not, it might be possible to block the pict-rs instance in your browser. That will only be a temporary fix, since I see no reason that they couldn't also be moving the hostname on the pict-rs instance.

Another mitigation would be to route one's client software or browser through a VPN.

I don't know if there are admins working on addressing the issue; I'd assume so, but I wanted to at least mention that there might be privacy implications to other users.

In any event, regardless of whether the "Nicole" spammer is aiming to deanonymize users, as things stand, it does appear that someone could do so.

My own take is that the best fix here on the lemmy-and-other-Threadiverse-software-side would be to disable inline images in messages. Someone who wants to reference an image can always link to an external image in a messages, and permit a user to click through. But if remote inline image references can be used, there's no great way to prevent a user's IP address from being exposed.

If anyone has other suggestions to mitigate this (maybe a Greasemonkey snippet to require a click to load inline images as a patch for the lemmy Web UI?), I'm all ears.

top 43 comments
sorted by: hot top controversial new old
[–] Cypher@lemmy.world 30 points 13 hours ago (1 children)

We used to do this on the EVE online forums until CCP caught on and banned inline images.

[–] UltraGiGaGigantic@lemmy.ml 18 points 11 hours ago (1 children)

"Man, everyone is on planet earth. How boring"

[–] Cypher@lemmy.world 39 points 11 hours ago (2 children)

We were using the IPs and post times to identify accounts, then checking IPs that connected to our VOIP servers so we could identify spies and either remove them or feed them false intel.

Basic counter-intel work and all for a video game heh.

[–] pootzapie@lemy.lol 3 points 5 hours ago

This sounds super cool and interesting, is there like a wiki I can read up about that stuff??

[–] Zentron@lemm.ee 12 points 11 hours ago

Jesus i miss that time , counter intel was so easy back then

[–] rumschlumpel@feddit.org 71 points 17 hours ago* (last edited 17 hours ago) (2 children)
[–] Justas@sh.itjust.works 41 points 17 hours ago

Yes, especially because many Lemmy users have some radical views.

[–] forrgott@lemm.ee 2 points 16 hours ago (1 children)

Yup. Especially with digital watermarking by modifying a pixel here or there - something you'd naturally need a computer to detect.

[–] milicent_bystandr@lemm.ee 28 points 16 hours ago (1 children)

You don't need digital watermarking got for this. Just host the image at different URLs. evil.lemmy.org/nicole-mbystander.png and evil.lemmy.org/nicole-forrgott.png. (Really you'd use a random string and save in a database.) Then see what IP requests the -mbystander version and which the -forrgottt version, and you have our IP addresses.

[–] forrgott@lemm.ee 7 points 16 hours ago

Ummm, yeah. What he said.

Lol, though. Just that it's so, well, me to overthink it! 🤣 But yeah, your idea is so much easier to implement. Just for starters 😝

[–] DFX4509B_2@lemmy.org 13 points 13 hours ago* (last edited 13 hours ago)

I've been blocking and reporting these nicole accounts as spam bots lately. I hope this doesn't become as bad as the spam bots in the YT comments.

[–] RaoulDook@lemmy.world 30 points 16 hours ago

Might be good to think about fediverse security similar to email security, as they are both federated information sharing systems. Email has spam blocking, allowing for reputation checks and other complex stuff. I wonder if Lemmy instances could collaborate on a SpamHaus type of bad host / bad user list to use and share.

[–] can@sh.itjust.works 13 points 14 hours ago* (last edited 11 hours ago)

A while back someone mentioned something similar would be possible and as a proof of concept linked to an image that would generate on the fly to include your location.

[–] drspod@lemmy.ml 17 points 17 hours ago (1 children)

On my instance (.ml) all of the images are fetched through the image proxy.

What version of lemmy is your instance running?

[–] tal@lemmy.today 15 points 17 hours ago

0.19.6. Could be that there's some configuration option.

[–] LWD@lemm.ee 7 points 15 hours ago (1 children)

I miss those old images that would show you your IP address and ISP name, which were generated dynamically based on the request. They were designed just to be a bit frightening. But, because they were rendered on the server side, there was definitely nothing stopping them from recording your IP address too.

https://imgur.com/aYxadwg

[–] kabi@lemm.ee 5 points 15 hours ago

In July there were a couple of posts like that here

[–] NegativeLookBehind@lemmy.world 6 points 17 hours ago (2 children)

You should be running a reputable VPN full time, regardless.

[–] Cryophilia@lemmy.world 4 points 13 hours ago

VPNs are a condom for the internet

[–] BossDj@lemm.ee 1 points 12 hours ago (3 children)

OK, I'm in. What's a reputable one?

[–] sic_semper_tyrannis@lemmy.today 4 points 5 hours ago

Ivpn, Proton, or mullvad

[–] HappyTimeHarry@lemm.ee 8 points 11 hours ago
[–] NegativeLookBehind@lemmy.world 4 points 10 hours ago

Definitely Mullvad

[–] skillissuer@discuss.tchncs.de -3 points 16 hours ago (1 children)
[–] grue@lemmy.world 15 points 16 hours ago (1 children)

umatrix is unmaintained and thus solves nothing anymore, unfortunately.

[–] TacoSocks@infosec.pub 2 points 8 hours ago (1 children)

Are there any umatrix alternatives?

[–] quickenparalysespunk@lemmy.dbzer0.com 3 points 4 hours ago (1 children)

in my understanding, there was enough overlap between uBlock Origin and uMatrix that the developer didn't want/felt it wasn't worth to continue maintaining both.

I'm not too expert on both extensions, but maybe the functionality difference can be covered by NoScript or by using uBlock Origin with LibreWolf or some other combination.

[–] reksas@sopuli.xyz 1 points 20 minutes ago

i use both ublock and noscript, ublock is much more lenient about allowing javascript so its good first line of defence. I try to allow only those javascripts that are absolutely necessary to what i want to do. So many sites have tons of unnecessary ones that do who knows what.