I know transactions can't be deleted from my node. I know torrents can't be taken down no matter how hard you try. I know if you delete a tweet, people screenshot and they find their way onto way back machine.
It's a trade off we made for censorship resistance. If somehow we can control what other people store and serve in their own relays, we are also dead in the water.
So then what?
Open to your suggestions
Login to reply
Replies (2)
There's not much you can do about screenshots, but at least they must be manually initiated outside of the protocol. If a user "deletes" a post quick enough, or doesn't have enough obsessed fans, it doesn't make it to TMZ. The protocol should try to provide a sane privacy-respecting default for what it does have control over.
opsec