• She/Her

[Iris, 21, (She/Her)] [Jasmine, 25, (She/Her)] [Lupin, 8, (She/her)] [Macaron, 23, (He/Him)] [Angel, 23, (They/Them)] (Poly Bi Lesbian), (Therian ΘΔ), (Plural), Punk/Metal Musician and Furry artist (18+ only!) (Profile picture made by dragongirlsnout!!!!)


janederscore
@janederscore

no offense to the people making cute little widgets on cohost and i do believe them that they've all been pretty careful to prevent themselves from accidentally building ip scrapers and such. however the fact that ethics are the only thing that appears to be preventing someone from doing that Intentionally on their own funnie little poasts is uh, Concerning


Predstrogen
@Predstrogen
This page's posts are visible only to users who are logged in.

Gothfoxcoochie
@Gothfoxcoochie

I'd encourage everyone to send an email to Cohost's support voicing your concerns about this issue because as stated by Rita and Jane this is a major security issue that puts users of this site at risk of getting doxxed.


You must log in to comment.

in reply to @janederscore's post:

so what i'm talking about are posts that log identifying user information in order to serve you a specific thing. the post i'm talking about rn is one that's going around that gives you a fake little "post viewing debt" counter that will update every time your computer loads the post. an older, more Blunt example is the "spongebob literally doxxes you" post, where it's a randomly-selected image from spongebob squarepants with a text element overlayed that reads out your physical location.

both of the authors of these posts have stated that they went through the effort of anonymizing the data, and the spongebob poster specifically said that the information is not logged. and again, i do believe them! the people who made those posts seem trustworthy and i don't really feel like there's anything malicious at play whatsoever.

However . the issue i have is that when users are empowered to that extent, when the only restriction on their power is their own model of ethics, what is stopping someone from building a much more sinister machine. who's to say someone hasn't Already built a much more sinister machine, hidden in a completely innocuous image post that is already circulating.

the question of "malware on cohost" is not an if but a when, and honestly there probably already Are pieces of malware circulating that no one has yet been made aware of. i'm not a compsci major, i don't know how to solve this problem without gutting the user-accessible css tools, but its something that i think would probably be an extremely high priority problem to solve if i was running the show here.

in reply to @Predstrogen's post:

btw, requests to images on external servers can do the same thing, the server can log the request. if you want to prevent any potential external ip logging, you have to prevent any requests that go off the cohost domain & cdn. cohost themselves could do this with a content security policy if they wanted, but it would break lots of posts.