I’ve heard this security concern before, but I’m a bit confused about the real attack vector here. I mean let’s say you do this - you post an image to some random Lemmy instance and behind the scenes, you gather all the IPs which fetch the image. What malicious thing could you do with that? Genuinely curious.
I’ve heard this security concern before, but I’m a bit confused about the real attack vector here. I mean let’s say you do this - you post an image to some random Lemmy instance and behind the scenes, you gather all the IPs which fetch the image. What malicious thing could you do with that? Genuinely curious.
Hack their Gibson of course.