Could you address the difference in legal attack vectors caused by illegal material stored in contiguous blobs vs fragmented data chunks? Linking my older response to Odell's note.
View quoted note →
Login to reply
Replies (2)
Oh no there is some hexadecimals on my node all in one transaction!!!! It is fundamentally the same thing vs having one extra piece of software needed to stitch other bits together.
I’ll never know what’s on my node because I don’t look at transactions and have no way of decoding them. This means I would have to trust without verifying that some content is actually on chain. Node software doesn’t have the capability to view any of the data so I have no way to verify any claim.
It’s not the same thing. If you don’t have software that stitches the bits together then the data is meaningless to you. If someone breaks into your node to install software to do that, they are committing a criminal act in order to effectively plant evidence on your machine that you couldn’t have known you had without the additional software