

Someone with enough access to the Lemmy server and many TOR nodes might, I guess. Just access to TOR shouldn’t be enough, as the connection to Lemmy is encrypted so they don’t know who logged in or what they accessed on Lemmy.
I think access to Lemmy alone would not be enough as well because just knowing that a user came through one TOR node doesn’t link it to other services. Many users use the same TOR node.
I’ve contributed to PHP, one of the most widely used programming language on the web.
Felt really good to read someone else writing an explanation in the docs of what your contribution does.