- Step 1: Don’t host in the USA
- Step 2: Don’t host in a USA puppet ally
Probably good advice but not exactly relevant. The person was hosting a server in their house and got raided for unrelated reasons and all their electronics were seized. Had they hosted in a data center or at least had off premises back ups, this wouldn’t have happened.
I thought one of the points of the fediverse was to not be centralized in data centers that are more easily controlled. It’s supposedly supposed to be easy and relatively cheap to spin up your own instance on your own hardware. Just outsourcing to a data center I think goes against what the fediverse promised.
I disagree.
It’s about control of the platform. A datacenter isn’t going to start making administrative decisions about the “business direction” of your instance. They can shut the server down, but so could a thunderstorm on a home server.
Even if the data center did (for whatever reason) administrate an instance, the idea of federation still holds because users get to decide if they like the decisions being made - regardless of who is making them.
Like anything, it’s a trade off. The fact that you can do whatever you want is the good thing. As long as everyone isn’t in the same datacenter, it’s fine. There’s datacenters all over the planet.
If you’re self hosting, you can mitigate the risks by having some kind of contingency plan though. Just having backups in another location would have made it possible to get back up after the interruption. Now, this instance is probably just screwed.
Data centers aren’t inherently bad and neither is self hosting. But there’s different risks that need to be planned for.
This is exactly why I only host on DefinitelyNotAHoneypot.sk. everyone knows that the CIA can’t run colo services in Slovakia.
As an American, feel free to just mute us. Watch the slow motion collapse from a distance.
I have dreamed about the ability to do this for so long. Cut US communications off and prohibit travel in/out. You can come out in 100 years when you’re ready to play nice.
Unfortunately, good old Uncle Sam may take offense at that, and his six-shooter contains somewhere on the order of a few thousand thermonuclear weapons, which he’s already used, twice. He’s also not afraid of ignoring national sovereignty and borders when it’s in his interests.
Not saying this is a good thing by any means, and sorry for raining on your parade, but the situation is what it is. Hopefully sometime in the next few decades, if not sooner, some kind of change for the better can be made. Who knows?
The US again continuing to flex its muscles that it truly does own and control half the world, as it so affectionately reminds us daily.
It is absolutely hysterical how bad authoritarianism has engulfed all modern governments. This isn’t remotely a left vs right thing or a US thing, almost all modern governments have become this way.
The person referenced in the article was raided for completely unrelated charges. It just happened they took the server and backups as part of the raid. Had they hosted off-site or kept the backups off-site, the damage would have been minimal. This article brings up a good point, but it’s not the nefariousness that the title implies.
Cops took what wasn’t needed and haven’t returned it (that we know of).
I’d say that’s about as nefarious as it gets.
From what I read, it looks like they were hosting off-site, but had an unencrypted backup of the database locally at the time of the raid.
But this is the strength of federation. One tiny bit of the fediverse was taken down. This did not affect the rest of it. There will always be bad actors, whether the cops, the administrators of a particular instance or the owners of a mega-forum like twitter or reddit. With a decentralized system the damage is localized and minimized.
It wasn’t even taken down. The dude was raided probably because of some electronic crime, they took his electronics to get evidence. Completely reasonable.
On their backup hard drive happened to be a backup a mastodon instance, so by extension they got that too. The backed up data, not the server.
It’s not some nefarious collusion, it’s completely reasonable actions.
Now whether the backup should have been stored unencrypted on a hard drive at their house? Well that’s a server admin problem not an FBI issue, but the comments here come across like the FBI shouldn’t have done what they did.
But I’d argue that you should not store anything on Mastodon where it would be an issue if it became public. It’s basic 90s internet safety. We know that the data isn’t encrypted (the same for Lemmy), don’t go sharing passwords on a site designed for public sharing.
Yeah, I want to know what these unrelated charges were for before I get up in arms about a nothing burger. Sound sus as hell.
Get Tor Browser and/or Tails OS. When privacy is important and you need to be anonymous, use only Tor-friendly instances only via Tor (never once log in showing your real IP - if you accidentally do that, you’ll have to re-create another account as a different person).
When an email address is necessary to sign up, get one anonymously (again using Tor Browser), from a privacy-centric company or group, e.g. Tutanota, Disroot. Needless to say never ever use Gmail. https://tosdr.org/en/service/217
Still no guarantee of privacy. Tor exit nodes have been known to have been monitored, and tons of sites seized.
True. Tor, Tails, PGP (GPG), Monero etc. are not magic: you can be still de-anonymized especially if you post your private info by yourself. One thing I’ve been feeling a little uneasy about Tor is, the project is largely funded by the US Government itself, and in the past the US intentionally weakened Netscape browser (*1). While I would like to believe that something similar is not happening to Tor Browser, I’m not an absolute believer of Tor (like you said, there may be bad actors in the Tor network too). I might be feeling somewhat more comfortable if Tor Project were based on Europe, not the US.
Nevertheless, using Tor should be surely safer and more privacy-friendly than just using clearnet. Tor Browser is FLOSS and free as in free beer too. Using it when you’d like to be anonymous is not such a bad idea, especially if your instance is Tor-friendly.
(*1) https://wl.vern.cc/wiki/Crypto Wars?lang=en#PC_era Onion - http://wl.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion/wiki/Crypto Wars?lang=en#PC_era
Another example of intentional back doors standardized by the US is: https://wl.vern.cc/wiki/Dual_EC_DRBG?lang=en Onion - http://wl.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion/wiki/Dual_EC_DRBG?lang=en