Bluesky is saying that torture and self-harm posts are acceptable. That's the end of Bluesky as far as I'm concerned. They don't have a clue what they're letting themselves in for.

@lauren Im still trying to confirm if this is their actual policy. That no user or server admin in bluesky can actually ban or delete content, but only end users can choose to see, or not see it.

So far, from what I see, it might be that later scenario.

@tchambers That control panel image seems explicit. It has a SHOW option for torture and self-harm, etc. Q.E.D., I would think.

@lauren I was kinda amazed that any social network would launch with what in essence was a "Show bloody gore, spam and hate, and fake account content" toggle, too.

I was HOPING that like the Fediverse that each admin of a BlueSky service can mute or block or ban such content for all. But not sure that is so, yet.

@tchambers @lauren I don't believe "instance" admins have any say over what content federates and what doesn't.

As in, instances (or "nodes" in BS parlance, I think?) are just account/data storage. Admins, as far as I know, have no agency and barely any power in the system.

@rysiek @lauren I can't believe that is true. But cannot find anything in their docs or the posts there from developers to say otherwise.
@tchambers @rysiek Please keep me informed as you learn more. Thanks!

@lauren @tchambers I am too lazy to dig for it right now but I remember reading in their docs pretty explicit mentions that whole point is that from the user's perspective it should not matter which instance they are on.

I mean, even here:
https://atproto.com/guides/faq

> Account portability is the major reason why we chose to build a separate protocol. We consider portability to be crucial because it protects users from sudden bans, server shutdowns, and policy disagreements.

FAQ | AT Protocol

@lauren @tchambers also this:
https://atproto.com/guides/overview#speech-reach-and-moderation

> ATP's model is that speech and reach should be two separate layers, built to work with each other. The “speech” layer should remain neutral, distributing authority and designed to ensure everyone has a voice. The “reach” layer lives on top, built for flexibility and designed to scale.

"Speech" is what nodes do, "reach" is what (winner-takes-all bigger-is-better) recommendation algorithms do.

Node admins have no say over recco algos.

Protocol Overview | AT Protocol

@rysiek @lauren @tchambers

I read the same, but interpreted it differently. It's bad, but different bad?

I read it as:
* User data is stored in Merkle trees. Basically github repos where each post, like, comment etc, is like a commit.
* Each commit author is a DID, which is stable.
* You can host your GitHub repo of activity on any host. That's the "speech" part. You can set up your own lil nazi repo if you want.
* But search indexes across hosts. That's the "reach" part. Host admins filter

@rysiek @lauren @tchambers

I see confusion/possible jeopardy in that today, because there's no distinction between the AT protocol (git in this analogy) and Bluesky (GitHub in this analogy). Because BlueSky is the only instance of the AT protocol.

The maintainers of git can say, "Hey, Nazis might use this! We have no control! Don't blame us!" but GitHub can't say the same if they host illegal/harmful content.

@rysiek @lauren @tchambers

I do see the devs talking about actively building in the ability to block and ban users. I think block is coming this or next week.

And I think AT Protocol host admins can build their own pluggable indexers, and feed algorithms. So no one can make you host CSAM, or any content you don't want. At least, that's my understanding? I could be wrong.

Their "what's hot" feed is a placeholder implementation that just filters on likeCount > 8. But admins can roll their own

@mekkaokereke @rysiek @tchambers And what if the content is encrypted or otherwise obscured so that the node admin can't recognize it, but is still unwittingly participating in its storage and distribution?

@lauren Those concerns are orthogonal from a technological perspective.

e.g. SILC (Secure Internet Live Conferencing) is end-to-end encrypted with Perfect Forward Secrecy & has mitigations to defend against malicious server operators from eavesdropping, yet it does not prohibit server operators or channel operators from kicking/banning abuse.

The falsehood that end-to-end encrypted messaging facilitates CSAM is a canard.

Also see: @alexwinter's TEDx Talk.

@mekkaokereke @rysiek @tchambers

@byterhymer @alexwinter @mekkaokereke @rysiek @tchambers The reality is that any attempt to weaken end-to-end encryption (for law enforcement or any other reason) creates horrible weaknesses that will impact law-abiding citizens in all manner of negative ways. That said, it's coming. At some point in the not too distant future, most countries will outlaw use of end-to-end crypto in one form or another, starting with the major platforms. It's going to happen, especially given the pushback against on-device scanning schemes that were also awful.

@lauren Push back may still be necessary. SILC (and SSH for that matter) were both developed at a time when even exporting so-called "strong cryptography" from the USA was considered illegal.

In other words: the world has gotten friendlier to cryptography, not the other way around.

Also see: https://en.wikipedia.org/wiki/Bernstein_v._United_States

@alexwinter @mekkaokereke @rysiek @tchambers

Bernstein v. United States - Wikipedia

@byterhymer @alexwinter @mekkaokereke @rysiek @tchambers Or have you seen the various statements from Signal about pulling out of countries where end-to-end crypto is made illegal? They're not just saying that for jollies. They know what's coming.

@lauren I know Moxie personally, and do not consider Signal to be a protocol of merit. I have written about this publicly, repeatedly, for years. I know some of their other devs and even offered to work for them to fix their problems, but there are court transcripts with Signal logs entered as evidence, I consider them non trustworthy, to understate it.

@alexwinter @mekkaokereke @rysiek @tchambers

Signal

Drew DeVault: I don't trust Signal: I expect a tool which claims to be secure to actually be secure. I don't view "but that makes it harder for the average person" as an acceptable excuse. If Edward Snowden and Bruce Schneier are going to spout the virtues of the app, I expect it to actually be secure when it matters - when vulnerable people using it to encrypt sensitive communications are ...

@byterhymer @alexwinter @mekkaokereke @rysiek @tchambers The technical merits of Signal are not the issue. The issue is that countries are going ahead with banning e-e crypto, and the services that use it will be forced to end its use in those countries. And the U.S. is not immune.

@lauren The US is of course not immune, it's one of the worst places on Earth for human rights abuses and privacy violations. But two decades ago there were not the preponderance of multiple (some interoperable) encryption tools that exist now. I had Cisco VPN concentrator CD-ROMs which said: "Not for export outside of the USA" and "Made in Mexico" on the same friggin label two decades ago.

@alexwinter @mekkaokereke @rysiek @tchambers

@byterhymer @alexwinter @mekkaokereke @rysiek @tchambers Again, for 99% of people the open source tools, etc. don't matter. Techies can take care of themselves, but most people aren't techies. I realize there are many techies who don't give a damn about most nontechies -- Mastodon seems to attract them. You keep bringing up stuff from decades ago. News alert: it's 2023 now. Fascism on the rise. Both parties calling for tight Internet controls. Not 2000 any more.
@lauren this is just outright condescending.

@lauren " pulling out of countries where end-to-end crypto is made illegal" seems to be rather different than, e.g. (now PhD) Niels Provos' efforts to work on OpenSSH by DRIVING ACROSS THE USA BORDER so he was not in violation of international laws while he was a grad student at UMich. Niels Provos did self sacrifice to help all, Signal has not demonstrated anything approaching that, anywhere, ever.

@alexwinter @mekkaokereke @rysiek @tchambers