this post was submitted on 15 Oct 2024
1020 points (99.5% liked)

Technology

59495 readers
3050 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Wayback Machine back in read-only mode after DDoS, may need further maintenance.

you are viewing a single comment's thread
view the rest of the comments
[–] independantiste@sh.itjust.works 76 points 1 month ago (7 children)

One of the rare use cases of a blockchain actually being useful. A federated internet archive that uses a blockchain to validate that the saved data has not been altered by a malicious actor trying to tamper with proofs

That would be really cool but horribly inefficient because of the sheer amount of storage required

[–] RecluseRamble@lemmy.dbzer0.com 122 points 1 month ago (1 children)

horribly inefficient

The core feature of all blockchain tech.

[–] independantiste@sh.itjust.works 13 points 1 month ago (1 children)

To be fair that would not necessarily be because of the blockchain part, more because of the decentralized/federated nature of this theorical network

[–] RecluseRamble@lemmy.dbzer0.com 29 points 1 month ago

Sure, but the networking and consent-finding are defining features of a blockchain. Nobody calls a git repo a blockchain.

[–] kautau@lemmy.world 44 points 1 month ago (1 children)

I mean you don’t need the blockchain for that. The same way that distro mirrors don’t need the blockchain. It can be federated, with each upload being verified through hashes that they are in fact the real upload. I would argue that something like blockchain would remove the authority from them, granting the position of a bad actor spinning up enough servers to be able to poison the blockchain just because they had the computing power, claiming authority

[–] explodicle@sh.itjust.works 7 points 1 month ago (2 children)

Bro hear me out bro

We put the whole thing on a blockchain. BUT

  • entry order isn't super important

  • you don't need to validate the entire archive

So basically a blockchain, but for a bunch of files, not ordered. So instead of a native token, users can just trade bits of information as currency. 🙀

If it goes really well, we could even recruit one of the Bitcoin developers to help.

[–] kautau@lemmy.world 8 points 1 month ago

lol I fucking hate this because idiots will read this and be like “oh shit is this the new blockchain”

Well done

[–] downhomechunk@midwest.social 1 points 1 month ago

Take my money! All of it!

[–] RedStrider@lemmy.world 13 points 1 month ago (2 children)
[–] kautau@lemmy.world 5 points 1 month ago

Yes, this is a great example of where ipfs would work (specifically for file hosting, not necessarily for the actual web interface), and also, no ipfs is not a blockchain, and it shouldn’t be. I thought we were past the whole “can this be a blockchain” thing, but here we are. Blockchain is cool tech. It’s also incredibly inefficient for anything beyond a transaction ledger, or in today’s case, money laundering and trying to avoid taxes and regulation.

[–] zeppo@lemmy.world 1 points 1 month ago

Sounds like BitTorrent, too

[–] WaterSword@discuss.tchncs.de 10 points 1 month ago (1 children)

The thing is sometimed articles must be removed from IA (copyright (I disagree with that one) or when information is leaked that could threaten lives), with a blockchain this would be impossible

[–] tehmics@lemmy.world 4 points 1 month ago (2 children)

this would be impossible

Perfect.

I'd be interested in seeing real examples where lives are threatened. I find it unlikely that the internet archive would be the exclusive arbiter of so-called deadly information

[–] WaterSword@discuss.tchncs.de 9 points 1 month ago (1 children)

There was an actual example where a journalistic article about afghanistan accidentally leaked names of some sources and people who helped westerners in afghanistan, which did actually endanger those people’s lives.

[–] tehmics@lemmy.world 2 points 1 month ago (1 children)

If they're leaked, they're leaked. The archive doesn't change that one way or the other

[–] douglasg14b@lemmy.world 0 points 1 month ago* (last edited 1 month ago) (1 children)

Gotcha so you actually stated your previous question in bad faith as you had no interest in the answer to begin with.

[–] tehmics@lemmy.world 1 points 1 month ago* (last edited 1 month ago)

No. The archive of it isn't doing the dangerous part. The info was already out there and the bad actor who would do something malicious would get that info from the same place the archive did. I need you to show how the archival of information that was already released leads to a dangerous situation that didn't already exist.

[–] brbposting@sh.itjust.works 3 points 1 month ago (1 children)

I thought of something but I don’t know if it’s a good example.

Here’s the hypothetical:

A criminal backs up a CSAM archive. Maybe the criminal is caught, heck say they’re executed. Pedos can now share the archive forever over encrypted messengers without fear of it being deleted? Not ideal.

[–] tehmics@lemmy.world 2 points 1 month ago* (last edited 1 month ago)

Yeah this is a hard one to navigate and it's the only thing I've ever found that challenges my philosophy on the freedom of information.

The archive itself isn't causing the abuse, but CSAM is a record of abuse and we restrict the distribution not because distribution or possession of it is inherently abusive, but because the creation of it was, and we don't want to support an incentive structure for the creation of more abuse.

i.e. we don't want more pedos abusing more kids with the intention of archival/distribution. So the archive itself isn't the abuse, but the incentive to archive could be.

There's also a lot of questions with CSAM in general that come up about the ethics of it in that I think we aren't ready to think about. It's a hard topic all around and nobody wants to seriously address it beyond virtue signalling about how bad it is.

I could potentially see a scenario where the archival could be beneficial to society similar to the FBI hash libraries Apple uses to scan iCloud for CSAM. If we throw genAI at this stuff to learn about it, we may be able to identify locations, abusers and victims to track them down and save people. But it would necessitate the existence of the data to train on.

I could also see potential for using CSAM itself for psychotherapy. Imagine a sci-fi future where pedos are effectively cured by using AI trained on CSAM to expose them to increasingly mature imagery, allowing their attraction to mature with it. We won't really know if something like that is possible if we delete everything. It seems awfully short sighted to me to delete data no matter how perverse, because it could have legitimate positive applications that we haven't conceived of yet. So to that end, I do hope some 3 letter agencies maintain their restricted archives of data for future applications that could benefit humanity.

All said, I absolutely agree that the potential of creating incentives for abusers to abuse is a major issue with immutable archival, and it's definitely something that we need to figure out, before such an archive actually exists. So thank you for the thought experiment.

[–] JayDee@lemmy.ml 2 points 1 month ago

We don't need a blockchain for that.

Having multiple servers which store file checksums would have much less overhead, would be easily repeatable and appendable, with no need for unnecessary computational labor. Linux mint currently uses the checksum process for verifying that an ISO downloaded is not altered in any way, and it can work for any file (preferably not humongous files).

Strive for K.I.S.S. whenever possible.

[–] Valmond@lemmy.world 0 points 1 month ago

You need a useless 51% of good nodes to assure that, making it even more wasteful.