@mint@ashten Since fedilist has been running for a little over three years, if I was planning something evil, surely I would have gotten around to it by now.
Since I can't see OP, just the subject line that has ended up in other people's posts (maybe woem.men blocks SPC), I guess I'll address it here with the hope that it somehow gets to that admin.
> fedi meta, scraper advisory for admins
It's not a scraper; it doesn't try to get any content, it uses only well-known API endpoints, and it only fetches the stuff that every Misskey instance fetches, for example. It clearly identifies itself in the user-agent and doesn't try to get around it if people reject requests from that UA. It even respects the `discoverable` flag on the admins' profiles. (And it has help text for same: http://demo.fedilist.com/p/discoverable .) There are actual scrapers around, and they are way less friendly and are way less open about what they are doing and why. (Hi, @Drand !) When fediverse.network went down, I wanted something like it, and no one made something like it, so I did. It's never been the highest-priority project, like I mostly add stuff to it when someone asks or when I have a question about something going on in the network.
The point of the project is that it is hopefully useful to admins and people curious about the network, as well as most of fedi. It saves me having to look up who admins are, whether something weird is going on with an instance, it shows the instance description without requiring a bunch of JavaScript, it lists the source code repositories for the instances that report them ( http://demo.fedilist.com/source-code ), it lists the instances where something unusual is going on ( http://demo.fedilist.com/hockeystick ), there are CSVs and RSS feeds for almost every page, you can see the newest instances ( http://demo.fedilist.com/instance/newest ), the front page has fedi-wide statistics, you can point an RSS reader at an instance's status changes page and see when it goes up or down; I use it to monitor instances I use ( http://demo.fedilist.com/instance/recent-changes?host=shitposter.club ) or run ( http://demo.fedilist.com/instance/recent-changes?host=freespeechextremist.com ) so that I can see if there's downtime or if it's my net connection. You can search for instances by name, description, whether they are on Tor or the clearnet, whether registrations are open or closed or invite-only or approval-only.
That has been useful. There are a lot of pieces of software and it can be difficult to figure out what's going on with an instance. If there's a lot of spam coming from it, but you can see that eight hours ago it just had three users and it has open registrations, then probably the admin is asleep and not malicious. We also used it to figure out where the activitypub-troll.cf peers got into the network (sorting the list of instances by peer count, it became obvious when some of them had 100k peers), and that is how we found out that it got Misskey worse than Mastodon, even, and we were able to ping the affected admins (at least the ones that didn't block us). The hockeystick page linked above was created as a response to that, so instances that are acting unusual (relative to their own previous behavior) are highlighted.
There's already fediverse.observer and it's more useful for people that are just joining, so they can find an instance, but the data that's useful to people that are already here is a little different, fediverse.space always looked cool.
The data is all there so that it's open and accessible to anyone using fedi, with the hope that it's useful to people. There's nothing devious going on, it's exactly what it says it is.
> She POSTs this message to her outbox. (Since it's an activity, her server knows it doesn't need to wrap it in a Create object). > Feeling happy about things, she decides to post a public message to her followers.
@judgedread Apparently, I'm crippled in the absence of Pleroma displaying the filenames above the attachments; apparently it doesn't even occur to me to write down things that are conveyed by the filename.
That is the_mkultra_hits.webm and I think this explains the file perfectly.
@lpheathen2@judgedread Well, yeah, but I'm unreasonably paranoid and I still think "Don't click a link" is a bit much. It's like the threat model is too vague and ill-defined, and when the alarms go off over everything, it's easy for the actual threat to sneak past.
> I truly thought most people on here had some form of a sandbox set up for safe viewing of threat material from threat vectors that monitor for IoT.
The chudbuds.lol admin got her tax returns and divorce filings and child support payments and everything down to photos from the hospital of her new husband's dick injury, all posted online. She ran an instance with 2100 active users ( http://demo.fedilist.com/instance/chudbuds.lol ) on it, and she used the same Windows computer to administer that machine, handle business, do her Twitch streaming, and also install RAT tools disguised as Minecraft mods. I am not sure what qualifies as "most people" but I think people that are remotely careful about anything are vanishingly rare. Most people don't really have a reason (although in Claire's case, installing a random executable on the computer she used for everything while also acting as an admin for a very noisy instance is possibly the biggest mismatch between how careful someone should be and how careful they are).
> ( don’t click links) (don’t open rando pdf’s)
In thus case, it's a known domain belonging to a regular site and it's an academic PDF and we're not at "don't click links" threat-levels yet. That's Gab levels of of "What if they find my IP address?" paranoia. It's just shitty people publishing an academic dry-hump. It's not a thing to worry about. Tor's sufficient for now.
@Hyolobrika I have the screenshot they sent me and when FSE is back up, I will have the link there, but the original post was removed from sneed.social and sneed.social is itself gone now.
> on another note, police do go through social media feeds manually. They even have dedicated tools for it like this one https://www.hunch.ly/
Yes. I put in a bid with a company that was building one for ISIS Twitter accounts a long, long time back, when that kind of thing didn't make me projectile-vomit immediately. Then there's this company down in Orange County that uses Elixir to do automatic transcription and keyword search of phone calls made from prison: https://leotechnologies.com/careers/ . There are a million like this.
> Think about the average case police deal with.
Regular cops and the Secret Service are very different.
> I fail to see why there would be any need to waste resources contacting and waiting for facebook in a case like that.
Sure, that's local cops, though. They are investigating different things than the Secret Service and for different reasons and with different staff. The FBI is closer to local law enforcement than the Secret Service, but the FBI has a direct pipe, they just ask and receive.
@RustyCrab@Vaghrad@cassidyclown@creamqueen@mint If this post sounds like I missed something, it's because rustc ate all of the RAM and angered Firefox and I'm typing from memory because Rust has the dumbest goddamn compiler and it shits crates into your home directory because it apparently hates when builds are self-contained because it is an idiot and I'm going to go throttle the team behind librsvg.
> Also somebody else probably scrubbed his timeline and sent it to them as a tip.
That's more plausible.
> a lot less effort than contacting somebody in Australia.
You keep saying that like it's more effort to email someone in Australia than it is to email someone locally.
> Also my friend involved in LE says police call people all the time. They come knocking if they can't get hold of you. It probably depends if they think you're a flight risk or a genuine threat.
I don't know the extent of your friend's involvement, but even local cops don't call if they have a problem with something you're doing, they just come find you. I've never seen them call to threaten someone, and I've never even *heard* of the Secret Service doing that.
But that's not the big deal. The point at which I said there's no chance they were the Secret Service was the weird internet-style threat. They don't just call and threaten you with various and sundry, not if they want to keep *their* jobs. If they're going to make a threat, it's not "We'll call your job and tell them you're being racist on the internet!", it's about maximum sentences and how, unlike states, federal sentences don't come with early parole. "We're gonna call your boss!" is something people say (or do) when they are mad at someone on the internet, the type of threat made by people that don't have the authority to get you arrested, and it's basically calculated to play directly into that specific worry. If a cop threatens to beat you up and steal your meth, is that guy probably an actual cop or a meth addict? (Hint: the real cop will just steal your meth and pretend he didn't see it.)
Alt of a @p@freespeechextremist.com , if you even believe that.If I'm posting here, it's usually because FSE is down.I am working on Revolver: https://liberapay.com/Revolver .