But it is an open source project and the developers views are strongly in favor of privacy, so yeah you can self host it or check the source code. But I think it’s safe to assume they didn’t program it like that.
Note that people who host an instance can theoretically change it, but still I wouldn’t worry it’ll actually happen.
Instance admins are pulling the code down and implementing it in their server. They could easily slip in some malicious backend code and there would be no way to verify it.
Of course, I said that too. And unless you self host yourself you have to trust the instance you’re using. But the question itself was more about lemmy in general, and most people just deploy the docker image or something.
Also, I don’t believe that, assuming an average person host an instance, the host will want some random people metadata from photos. It’s not big corps that process every bit of data they get.
Rule #1 in internet privacy: don’t assume best intentions of anyone. Just because it is open source does not mean whoever hosts the instance didn’t modify the source.
But you never know (unless you run your own instance) if your instance has been modified to record it somewhere before it is removed.
But it is an open source project and the developers views are strongly in favor of privacy, so yeah you can self host it or check the source code. But I think it’s safe to assume they didn’t program it like that.
Note that people who host an instance can theoretically change it, but still I wouldn’t worry it’ll actually happen.
Instance admins are pulling the code down and implementing it in their server. They could easily slip in some malicious backend code and there would be no way to verify it.
Of course, I said that too. And unless you self host yourself you have to trust the instance you’re using. But the question itself was more about lemmy in general, and most people just deploy the docker image or something.
Also, I don’t believe that, assuming an average person host an instance, the host will want some random people metadata from photos. It’s not big corps that process every bit of data they get.
Which is good to be aware of, but I don’t think they’d want your image exif data.
Rule #1 in internet privacy: don’t assume best intentions of anyone. Just because it is open source does not mean whoever hosts the instance didn’t modify the source.
Then what is the first rule?
Pascal indexes are the best
Good point. I’m just now getting to this thread to see all the replies, so I bet I’ll find some answers on how to do it via my android
Do what? Remove exif?