With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?
With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?
Something to consider would be to compare this to the walled gardens, say Facebook. Is that a malicious ‘instance’?
And then what is the chance to register on a malicious one in the fediverse?