Hacker News new | past | comments | ask | show | jobs | submit login

> The problem is you’re simultaneously arguing two points and relying on whichever point gives you the most leverage at each juncture.

No I am not.

> If .gov == bad guy then you’re screwed whether or not you leave a digital trail on social media because you’re already leaving one anyway (unless you’re a marginal outlier that isn’t worth considering for this “problem”). If that’s your threat model then you’re either super-important or I worry you’ve been sold a scary story by social media algorithms.

You are pretending as if one would need perfect op-sec (which is impossible). If you have a throwaway email, a sim paid for via cash and a VPN/Tor will make you much more difficult to track down and most of this can be learned via watching a few YouTube videos. You don't even have to do the more crazy stuff like running Tails.

Having an ID requirement will make it much more difficult as I suspect other regions will soon follow suite in implementing something similar.

There are also benefits to pseudo-anonymity. I want to keep my online life and my real life separate. This will mean that they can never be separate.

> On the other hand, the idea that this is an impossible tech problem to solve is also disingenuous. My point is that it could be solved. And quickly and easily too. If the incentive model were there. And whilst I’ve not given the solution a huge amount of thought (I’m not actually that interested in solving it) I’m certain that an authenticated assertion could be made that wasn’t directly attributable to an individual - i.e., a mechanism could be developed that would solve for both problems.

I never said that the tech problem was impossible to resolve. Again that is your assertion. I simply stated what I believe is most likely to happen in the near to medium term.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: