• 0 Posts
  • 12 Comments
Joined 11 months ago
cake
Cake day: July 23rd, 2023

help-circle

  • Once you start hosting an instance that has open registration, it’s not just “their house” anymore. They are providing a service to people. They do so willingly. Arbitrairly blocking instances because you don’t know how something works and don’t bother to check it isn’t the way to host a free and open instance.

    You seem to be uniquely bad at reading so this is comment is the start of this subthread you originally replied to. Nobody ever suggested they COULDN’T implement any rule they please. It was never a point anyone brought up for you to be refuting. It is literally you dishonestly trying to steer the discussion away from the actual point of discussing SHOULD they.







  • It would be preferable if you would lie less. Evil pirate uploads potentially_infringing.mp3 to to filehost. Filehost actually serves potentially_infringing.mp3, a community on db0 hosts a link to potentially_infringing.mp3, lemmy.world caches locally a copy of data from db0. Of those the one guy directly uploading the information is at risk of an extremely unlikely single digit thousands of dollars.

    Nobody not even evil pirate himself is at risk of decades in prison or millions in debt. Companies responsibility basically ends at taking stuff down when specifically notified of infringing content.



  • This isn’t useful or sufficient. You have to consider how many bots get banned and cost to determine efficacy. If you want 10,000 fake people to manipulate real people $10,000 doesn’t seem a high price if you make the fake people act organic enough that they largely aren’t banned.

    It would be more useful if a singular service verified sufficient credentials to prove you were an authentic human and allowed you to auth to various sites. This in turn creates the problem that verifiers now know a LOT about your online life.

    If the verification involved site -> verifier -> government held public key I think you could arrange so that none of the parties had enough info to identify users.