The FBI raided one of the admins of Kolektiva and a full copy of the website's database, dated early-may, was among the data seized. Full details in the linked URL.

Kolektiva.social is a Mastodon instance focused on radical politics and activism, with about 6.6K active users. One of the largest open-signup instances of its kind.

  • Cadende [they/them]
    ·
    edit-2
    1 year ago

    Scary stuff

    Take this as a reminder: Do not dox yourself in DMs on social media. Treat them as if they were public, at least in terms of opsec.

    If you want your communications to be properly private, use Matrix or something. This includes hexbear

    Emails and other signup info too. If you have any reason to think you could be targeted by feds, other steps like using a VPN or Tor might be next. But the above advice is true for most social media users, celeb DMs leak all the time, for example. There's always a way.

    • JuneFall [none/use name]
      ·
      edit-2
      1 year ago

      Yes, DMs are pretty much never deleted, the kollektiva instance leaked the IP adresses of users within a 3 day range in the past, as an unencrypted db image was currently worked at.

      This means that you have to use VPNs/TOR and dynamic IPs to stay secure (or go the public varying internet cafe route).

      • blobjim [he/him]
        ·
        1 year ago

        And Hexbear doesn't even try since it uses cloudflare lmao

        • Cadende [they/them]
          ·
          edit-2
          1 year ago

          outdated reference. cloudflare is no longer used (at least not their CDN functionality)

          • blobjim [he/him]
            ·
            1 year ago

            ooh thanks for the info! Do you know what they're doing now?

            • Cadende [they/them]
              ·
              edit-2
              1 year ago

              not really, just that cf was dropped in the migration. nobody ever really liked cloudflare as far as I know but it did make certain things a bit faster and safer from certain kinds of attack. At the expense of all traffic going through the servers of a US company, who could if they wanted to probably spy on contents of traffic

              • blobjim [he/him]
                ·
                1 year ago

                Yeah it made sense as a practical choice. Dealing with potential DDoSes is a much bigger priority for a silly online forum than attempting and failing to be opaque to the US government xD

    • blobjim [he/him]
      ·
      1 year ago

      also the US government can always get the data from any service that wants to do business in the US. A service being hosted elsewhere does not mean it will not comply with US laws, especially if you're paying for it with a credit card or something and it has a sizeable US userbase.