How could anyone find out which sites are you following using an RSS feed? And I mean in a broad way: can the site track you? Can ISP? Network managers?

Let’s say you want to follow a bunch of political sites that you don’t want to be easily attached to, is RSS a good way to do it? Are there extra precautions to take?

My first thought would be that it’s the same as using any other browser, so not a great way to be private. Am I wrong?

  • drkt@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    18
    ·
    6 days ago

    An RSS feed is literally the same as going to the website. A request is being made to the domain and anyone who can see the data between you and the website can see it. If you think you’re secure going to the website normally, then an RSS feed would be secure, too.

  • MonkderVierte@lemmy.ml
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    4 days ago

    Your client downloads a XML file and parses it and then maybe downloads some images. There.

    If the client itself doesn’t track you, it’s as private as online gets.

  • MTK@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    5 days ago

    Gonna give you a tip.

    assume that 99% of anything you access online is visible to your ISP (and therefore your government and police) and the hoster of ther service.

    • marauding_gibberish142@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 days ago

      The downside is that it probably is a great fingerprint if you go through vpn or tor. But it also could limit your tor/vpn connection time to the shortest time possible.

      What do you mean? How is it any less private than on the clearnet?

        • marauding_gibberish142@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 days ago

          You raise a good point. I think that if an RSS reader could pull from different websites at separate times and either programmatically use the TOR browser /at elast have support for stream isolation along with randomly scheduling when to pull from what website, it should be able to evade most automated measures of surveillance. Timing and correlation attacks are the only ones I can think of other than NSA paying for over 50% if TOR nodes.