• ryannathans
    link
    fedilink
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    10 months ago

    Why is CSAM the only traffic you object to? When you run torrent clients and such how do you filter out CSAM peers from the DHT?

    • infeeeee@lemm.ee
      link
      fedilink
      arrow-up
      8
      arrow-down
      2
      ·
      10 months ago

      There were other similar initiatives where everything is encrypted, so you cannot be sure what others store on your node. For torrent you can select what torrent you download and share.

      I was thinking about Storj, where you get “money” for hosting other people’s content in a similar p2p fashion. For Storj the answer to the first 2 questions are money, but you can’t answer the third, because encryption. (“Money” is not real money but some strange crypto, but that’s not important now.)

      CSAM is just the worst possible example, it’s forbidden in most countries of the world, and no sane people should be ok storing it. The main thing is, if you host other people’s content, can you know what is the content, do you have some word if you want to host it or not.

      • ryannathans
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        10 months ago

        You do not have a choice what your machine passes on from your peers via the DHT

        • infeeeee@lemm.ee
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          10 months ago

          DHT returns an ip based on a hash, what do you mean.

          If you solely rely on DHT for searching for new things to download, than yes, that’s a good way to get unwanted material on your hard disk, I don’t recommend to do that to anybody at the curtent state of the technology. Don’t mix up things deliberately, usually people don’t do that, they get a torrent file or magnet link from a trusted source, than DHT can’t mess it up.

          • ryannathans
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            10 months ago

            Participating in the DHT allows others to find torrents and peers, without filtering, beause your machine is sharing information from your DHT peers.

            Interesting where you try to draw the line

            • infeeeee@lemm.ee
              link
              fedilink
              arrow-up
              2
              ·
              10 months ago

              As I understand DHT is just addresses and hashes, not the actual data.

              I draw the line this way: If I disconnect the computer from the network any given time, does it store the questionable data.

              • ryannathans
                link
                fedilink
                arrow-up
                2
                ·
                edit-2
                10 months ago

                Would running an onion relay that helps people access illegal material be fine? Nothing gets stored on your machine

                • infeeeee@lemm.ee
                  link
                  fedilink
                  arrow-up
                  3
                  ·
                  10 months ago

                  Yes?

                  Do you want to ban the internet because people using it for bad things? Basically you say the same thing.

                  I don’t care what other people do, I care what they could do with me.

                  • ryannathans
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    10 months ago

                    I never suggested such a thing, was just curious on your viewpoint.

                    The way I see it, as any platform or service gets more users, traffic and messages the probability that it will be used for nefarious purposes approaches 100%. It’s the nature of life, it’ll happen anywhere and everywhere people can communicate or interact. It’s counter productive to ban technology like encryption or decentralised services just because someone might use it in a way the government doesn’t like, or for other nefarious purposes.