• 0 Posts
  • 12 Comments
Joined 4 days ago
cake
Cake day: October 29th, 2024

help-circle
  • Thank you very much for pointing me in the right direction. I was able to dig a bit and I think I found it - it looks like they were being a bit of a pedantic asshole about some spelling/grammar thing, the moderator deleted their comment because… yes, it’s a pedantic spelling/grammar nitpick. Then that user threw a massive tantrum and started yelling mod abuse.

    Honestly, it’s a real shame that Liam lost faith in Lemmy over something stupid like this. Yeah, there are downsides of a public mod log - really hateful vile shit will just persist in there forever when realistically it should be just wiped out entirely. I think overall it has more benefits than drawbacks, but I certainly wouldn’t say that being opposed to a public mod log is some sort of smoking gun evidence that he abused his mod powers.

    So yeah, this one guy behaving like a self-centred jerk actively contributed towards pushing a well-known and prolific linux gaming journalist off the platform. Great stuff, love to see it.

    Screenshot:




  • From what I understand, which honestly, isn’t a lot - the method used to anonymize transactions and balances is more like obfuscation than anything else. The system uses various techniques to fuzz up the data in such a way that it becomes impossible to trace.

    It’s a bit like if you wanted to send a bank transfer for £200 but anonymize it somewhat, you could transfer that money around between a bunch of other bank accounts, before sending it on to the final source. And if multiple people are doing the same thing, it becomes essentially impossible to determine where the money entered and left.

    The problem is though that such systems aren’t true encryption in the same way that RSA is, for example - the data isn’t unreadable, and it’s not impossible to reverse, it’s just that there’s so much junk data and it’s such a mess that it makes the true transactions difficult to identify and the end user has extremely strong plausible deniability. However, it’s likely just a matter of time before some state actor finds a vulnerability in the technique that allows them to trace transactions - if they haven’t already done so.