this post was submitted on 25 Feb 2026
46 points (100.0% liked)

Chapotraphouse

14284 readers
802 users here now

Banned? DM Wmill to appeal.

No anti-nautilism posts. See: Eco-fascism Primer

Slop posts go in c/slop. Don't post low-hanging fruit here.

founded 5 years ago
MODERATORS
 

This is bad, and I've already given up on being anonymous on the internet.

But maybe we get to have some fun and doxx the baddies too?

top 18 comments
sorted by: hot top controversial new old
[–] quarrk@hexbear.net 8 points 14 hours ago (2 children)

Even if it’s possible, don’t make it easy. Too many people post here hyper specific details like “my grandfather with has an adopted daughter from Bangladesh who became a rural doctor”

Don’t make things too personal here, even if most of us are friendly

[–] electric_nan@lemmy.ml 7 points 10 hours ago (1 children)

Salt your posts with disinformation as well. Mention things about yourself that aren't true.

[–] Liketearsinrain@lemmy.ml 6 points 5 hours ago

This is the way. I do it by having bad takes on purpose.

[–] Tabitha@hexbear.net 6 points 10 hours ago

Stylometric surveillance is already here and does not depend on the target telling the same story twice. I'm not even sure LLMs help the surveillors, but as a community we should investigate more into adversarial stylometry.

[–] umbrella@lemmy.ml 12 points 18 hours ago* (last edited 5 hours ago) (1 children)

yes this is known, and not even that new. they way you type here can be linked to the same patterns elsewhere.

and lemmy is a very public forum. some time ago there was news facebook was scraping us, and there is probably more of them doing it.

private encrypted and secure messaging exists for now, but not here and not like this.

[–] chgxvjh@hexbear.net 3 points 6 hours ago (1 children)

Was that about Threads adding activitypub?

[–] umbrella@lemmy.ml 2 points 5 hours ago* (last edited 5 hours ago)

luckily, most good instances defederated from meta.

unluckily, spinning something covert up or scraping the fediverse other ways is perfectly doable.

it leaked they were scraping some instances, but iirc not exactly how they were doing it.

this applies to everything you write though so i dunno how safe we are tbh.

[–] SnakeEyes@hexbear.net 2 points 11 hours ago* (last edited 10 hours ago)

That just means we gotta start talking like LLMs so it gets matched to millions of other accounts, no?

[–] BountifulEggnog@hexbear.net 10 points 21 hours ago* (last edited 20 hours ago) (1 children)

I wondered about this and had an idea for a (similar but worse) pipeline, very interesting paper.

Wonder when this will be on github and every nerd has a copy running on their computer.

[–] RNAi@hexbear.net 6 points 12 hours ago

The Gestapo 3.0 will be crowfunded by the worst people you know

[–] TankieTanuki@hexbear.net 8 points 20 hours ago (1 children)

How is it possible to validate the results?

[–] BountifulEggnog@hexbear.net 6 points 18 hours ago* (last edited 18 hours ago) (1 children)

The paper has several different datasets and explains how they got them, but for their test data they already knew the link existed. I think this one is probably the most relevant for actual attacks. They split accounts, giving a one year gap in their post history to simulate an abandoned account etc and added some fake profiles that didn't have a match.

If you mean running this yourself, you can't, they didn't post prompts or anything. Just an overview of their pipeline. Sorry at first I thought you meant how could they validate that the users were the same person.

[–] TankieTanuki@hexbear.net 8 points 18 hours ago (1 children)

Oh I see, they stripped the usernames and matched the comments. I thought they were claiming to have matched usernames to legal identities.

[–] BountifulEggnog@hexbear.net 9 points 18 hours ago

They did that too, with hackernews and linkedin accounts, as well as some anthropic interviewees. I'm less sure how impressive that is, because the accounts were linked by the owner. So they obviously don't care about opsec, so they're probably less careful then they otherwise would be. The paper isn't a super hard read if you're interested. But yea they don't actually dox reddit users, they do multiple different steps in that chain but not the whole thing. Guess we'll all have to see how well this works in practice.

[–] Llituro@hexbear.net 23 points 1 day ago (2 children)

you should assume that to sufficiently motivated megacorps, palantir, and the u.s. federal government, your best attempts at online anonymity can probably be circumvented by one failure point or another. i've taken relative pains to separate my username from my real life, and i know it's still not really meaningfully anonymous if the right company wants to figure it out. if they want ya, they got ya. everyone should post accordingly.

[–] chgxvjh@hexbear.net 5 points 6 hours ago

There isn't that much traffic on hexbear. ISP could pretty easily time TCP connections to Hexbear with when accounts post stuff.

[–] ComradeRat@hexbear.net 12 points 1 day ago

I always figure theres little point having better opsec than me org (we use google lol 💀)

:shocked-pikachu: