and the alternative is…?
pupbiru
or, continue making coffee while asking it to remind you to buy milk instead of either stopping to tap or completely forgetting which are the only possible outcomes
that’s not what the quoted text says at all… let’s rephrase this:
much like how users of one lemmy service such as lemmy.world can still reply to users of another service such as kbin.social, users may still view content and interact with users on any other instance in bluesky
this doesn’t say that lemmy/kbin isn’t part of the fediverse. it takes no position on that fact, merely saying that the things conceptually work in a similar manner
peer to peer is an option too
then he’d have at least 1 kid that doesn’t hate him
oh yup that’s a very fair point then! you certainly wouldn’t use it for security in that case, however there are a lot of ways to implement this that don’t rely on the security of the hash function, but just uses it (for example) to point to somewhere in a trusted source to manually validate that they’re the same
we already have the trust frameworks; that’s unnecessary… we just need to automatically validate (or at least provide automatic verifyability) that a video posted on some 3rd party - probably friendly or at least cooperative - platform represents reality
you can get oral chlamydia, gonorrhea, syphilis, and hpv
so yeahhhh it’s basically everything
from the comment above, it seems like it took a week for a single image/frame though… it’s possible sure but so is a collision in a regular hash function… at some point it just becomes too expensive to be worth it, AND the phash here isn’t being used as security because the security is that the original was posted on some source of truth site (eg the whitehouse)
certainly record to flash, but you need to have notifications when the camera can’t be contacted/when storage would be theoretically getting full
that does open you up a little though: recording on device means the attacker can just destroy/steal the camera which is pretty easy because they, by definition pretty much, are in a place that’s trivial for an attacker to access
there are some things about america that i will just never understand
you can definitely produced perceptual hashes that collide, but really you’re not just talking about a collision, you’re talking about a collision that’s also useful in subverting an election, AND that’s been generated using ML which is something that’s still kinda shakey to start with
that’s not an alternative. i agree that’d be preferable, but given where the situation stands, what’s the concrete action to take to remedy the situation?