Skip Navigation
YSK: Your Lemmy activities (e.g. downvotes) are far from private
  • If you're a programmer, you'd know there are ways to authenticate a transaction without giving away giving aways, or storing, the person who initiated the transaction. It's more difficult to do of course. So it's often not done.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FI
    firefueled @lemmy.world
    Posts 0
    Comments 2