Theoretically speaking of course ;)
If my home instance gets hacked, what’s the worst case scenario for my personal data?
[This comment has been deleted by an automated system]
PM is a misnomer since it’s not really private. Direct message or DM would be more correct, on Lemmy, DM as if it would be shown in public.
Don’t forget email address if you have one for account recovery purposes
[This comment has been deleted by an automated system]
How does it not get PMs?
Are those local per device only?
[This comment has been deleted by an automated system]
Well that’s a super good piece of information Holy shit.
Haha, neat. That’s good to know! I wish the Lemmy apps would stop advertising PM’s them.
I don’t think I ever PM’d anyone on Reddit unless it was /r/HardwareSwap anyways.
What is a matrix account?
[This comment has been deleted by an automated system]
Email and hashed password. If you’re like most people and use the same password everywhere, they gain access to everything if they manage to crack it.
My paranoia about data breaches has gone down so much since I started using email aliases and a password manager
Thank you automatically created Bitwarden password.
Glad I don’t reuse passwords.
I always wonder about this though. Are hackers really going to manually test out my password in miscellaneous sites? How would they know what sites to try? And why me along the hundreds of thousands of passwords they would have stolen with mine? Seems like that’s something they would do if they’ve targeted a particular person, not if they’ve stolen a whole dump of credentials
No, that won’t manually test it in random sites. They will add this creds to their bot net to test Mandy specific sites like Facebook, Twitter, GMail, several larger financial institutions, and many others.
Always use different strong passwords and use MFA wherever it’s available. Security, like ogres, has layers.
They create giant databases of every breached password in rainbow tables from previously breached password hashes, and then try them all if they ever expose another breach. If they get a database in a breach they can try a lot, like trillions, very fast.
Re-using passwords makes things much easier for them.
Bots attempt passwords on sites’ login forms all the time but aren’t very effective. Usually have hundreds a day even when I had a wedding site not even listed on google. Probably only works for very short and frequently used passwords.
Does lemmy use a salt?
I don’t know, but given the fact that it’s 2023 and it’s open source, I’d say yes.
One would hope so.
Nothing. Everything your instance has is your IP address (mostly useless) and password hash (also mostly useless). Everything you have here is public. Maybe except your settings, like light/dark mode.
Password hashes are only useless if you have a good password to begin with.
If not, they can likely get your actual password from it if you re-use passwords etc.
Your email gets spammed, and your embarrassing subscription list and reading history gets forwarded to your boss/spouse are things that immediately come to mind. Also your PM’s if you use those. Lemmy should really rethink its privacy posture. Of course you should never share passwords between sites, so if your password gets cracked, it won’t be usable elsewhere.
Lemmy currently doesn’t have private communities afaik, but if it did, those would also be compromised.
Does it only keep the current email address, or a history of them? I am guessing some people who used emails with personally identifying information in the account name may want to switch to a proton mail account.