As we are concerned about privacy, I am curious just to understand if lemmy can be at some point exploited by someone to profile its users.
As we are concerned about privacy, I am curious just to understand if lemmy can be at some point exploited by someone to profile its users.
This all happens before the database even gets asked for information. The web server will make a log of the requests as they come in before responding.
At minimum the web server needs to know where to send the data back to.
Thanks, makes sense