My point wasn't so much that I think RED is shady but that exposing my IP seems like an unnecessary requirement to join. Why can I not have my membership tracked via an anonymous account? If they are concerned about account harvesting or something, then the interview already seems like a good enough measure, accompanied by seed ratio minimums.
tatterdemalion
Don't most YouTubers make more money with their own sponsorships than from YT ads? Can we start the mass migration to PeerTube already?
I love that the EU is cracking down on tech, but I also wish the US government could get in on that awesome rake.
I'm not in the market, but I've actually had similar thoughts of building a project on top of NixOS that's focused on self-hosting for homes and small businesses. I recently deployed my own router/server on a BeeLink mini PC and instead of using something like OpenWRT, I used NixOS, systemd-networkd, nftables, etc.
DM me if you want to discuss more. I think the idea has potential and I might be interested in helping if you can get the business model right (even if it just ends up being some FOSS thing).
I do this by necessity because the medium-sized carts are most popular and they're usually only available in the parking lot anyway.
Sorry if this sounds like a conspiracy theory, but how do we know that BlueSky isn't padding their stats with internal bots? I could see this being a viable strategy to attract users and overcome the social network bootstrapping problem.
Rate-limiting could also be applied at the federation level, but I'm less sure of what the implementation would look like. Requiring filters on a per-account basis might be resource intensive.
Why resort to an expensive decentralized mechanism when we already have a client-server model? We can just implement rate-limiting on the server.
The only correct answer is to be consistent with the code base you're working in or the language's conventions. If neither of these conventions exist, then someone has already failed you.
It seems irrelevant whether this person is using encrypted channels if they failed to maintain anonymity. If they distributed material and leaked any identifying info (e.g. IP address), then it would be trivial for investigators or CIs to track them down.
Technically it's an open protocol. Whether or not any other implementations will surface remains to be seen.