I was recently approached by a user claiming to be the developer of Sync for Lemmy who wanted to be a moderator of the community I created, !syncforlemmy.

I was able to verify this user was indeed LJ Dawson as I knew where to contact him on Discord.

It is quite possible that an impostor user on another instance may be created, for example ljdawson@beehaw.org could easily be made.

Should Lemmy have a verified user marker for members who are of importance to any given community? Are there any other options to protect users against nefarious persons playing impostor?

  • 5 Card Draw@lemmy.fmhy.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    Should Lemmy have a verified user marker for members who are of importance to any given community?>

    No, everyone is equal here and I want to keep it that way. I don’t want this to be twitter.

    Are there any other options to protect users against nefarious persons playing impostor?>

    You mean besides the one where you just successfully figured out the person was legit through verifying them?

    No, it should be up to the community mods to verify someone is legit not the app itself.

    • itsmikeyd@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      I respect your position, but I think that as federated services gain popularity, the percentage of users who have the nous to validate any person decreases. Additionally, I can’t image users being happy about answering large numbers of validation messages.

  • AlternateRoute@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    My initial thoughts on lemmy where that it was so strange we where going BACK to the trust everyone’s servers and separate accounts model like that of Email.

    Given its distributed nature there is nothing to protect against just setting up random squatter instances to quickly phish users with similar domains.

    It also means if you setup on a small instance that later goes away you sort of lose part of your identity.

    Some form of block chain distributed ledger that runs on the instances seems like it would address “SOME” of the issues.

    Any of the instances could add you to the account ledger you could have a singular unique name, and the ledger could record which instance created you and what verification has ever been done to your account. You could then directly sign in to ANY instance as that account provided you had the credentials that matched the chain entry.

    Verification providers could exist that SIGN your block chain entry with some form of validation and users and instances could chose which ones are recognized. This would be a way to add verification for those what WANT to be public not anonymous. All of which is optional.

    The ledger could also track if any instances are known to be untrustworthy maybe and other instances could vote not to trust accounts generated by them.

    • terribleplan@lemmy.nrd.li
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      There is DID which tries to do some of that. Many methods of registering your identifier have been registered (blockchain, bitcoin, crypto keys, purpose-built software, etc). Linking identities to some entity like this would prove ownership, but getting it implemented in places, encouraging users to use/check it (e.g. almost nobody GPG signs email), not trust similar usernames/domains, etc are all hard problems that having a spec alone doesn’t solve.

  • lrabbt@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    I like mastodon’s solution. That is, validate a public identity, like a site, your site appears on your profile and it’s only verified it you have proof inside the site itself.

    On this specific case, the Sync team may have their lemmy users on the Sync site.

  • SheeEttin@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    No.

    Let’s say you trust billg@microsoft.com. Anyone can already create billg@scam-site.cn. You wouldn’t trust that, why would you trust any other account you can’t authenticate?

    Like most impersonation questions, the answer is to verify identity through a known trusted source, as you did.

  • Izzy@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Nobody else can have the username Izzy@lemmy.world so that is proof enough that I am me within lemmy. If you have some identity outside of lemmy then that identity should be verified outside of lemmy.

    • Earthwormjim91@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      That’s doesn’t mean anything though.

      Nobody else can have the username Izzy@lemmy.world but Lemmy.world is only one of hundreds of instances on Lemmy.

      I could go right now and make Izzy@<any other Lemmy instance> and depending on the client used, nobody would be able to tell the difference if that client doesn’t list the instance as part of the username. For example, both mlem and Memmy on iOS do not show full usernames by default. You just show up as Izzy to me. So Izzy@lemmy.world and Izzy@lemmy.ml would show as the same user to me.

        • Earthwormjim91@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Unless the Lemmy devs create their own app, the vast majority of users are going to use third party apps like mlem and Memmy.

          So it’s still a problem with the platform if the username databases for instances don’t validate against each other to prevent reuse and impersonation.