1. 7
  1.  

  2. 1

    When it comes to the closing remarks one could also flip the coin to pose the question: When proposing new architectures or technologies for an anonymous(ish) communication service, how can it be built to not be attractive for propagation or proliferation of “bad” content e.g. CSAM or terrorist propaganda as it were. Is it at all possible?

    My own thoughts on communications technology has focused on protocols rather than services (wanting to avoid platform silos, but that’s a different discussion), and at that level it’s even more difficult as the technological aspect of information exchange is independent of notions of good and bad in the ethical sense, …and the evil bit did not get any traction afaik.