Yeah, that's why I use implementations that don't pass along your smut. Also, why does it even matter Citrea uses fake keys for your Rollup Vitalik wannabe bullshit, OP_RETURN doesn't even affect your bottom line. (Unless you are a fed that is)

Reply to this note

Please Login to reply.

Discussion

You're coping with ridiculous pretzel logic. Your node will still download and share said smut after it arrives in a block. Even if you run Knots.

Then I and others will expose the Miner responsible for distributing CSAM. Irreparable reputational damage. You are the pretzel here, filters don't work, that's why you have to disable them on the policy level... Yeah, real sound logic there.

Go for it.

Bitcoin as a system doesn't give a shit about reputation, it pays whoever mints a valid block.

Damn, that Ivory tower really detatches people from reality. People are still made of flesh. A reputation of what you're describing, you would be far more paranoid than you already are. Bitcoin is only money not a force-field.

state secrets and illegal pictures are already embedded in the blockchain using much older protocols like stamps. the data is unprunable. no matter which node software you use to synchronize you are already dirtying your hands with this stuff and you can't prevent it.

there are probably illegal samples of data embedded in the trading history of low volume penny stocks on the stock market. it's not possible to prevent people from embedding and propagating arbitrary data in a public append-only database system. you are trying to have your cake and eat it too. if you are so disturbed by the possibility, you need to put bitcoin down and find a different computer hobby. you clearly don't understand how any of this stuff works.

Did you not read the first comment? Contiguous data is different. You should put nostr down, you clearly can't read.

>contiguous data is different

Since you won't read my citation anyway I'll just suffice it to say, take your favorite CSAM, that I'm sure you have, convert the MP4 to bytes and then have a program like VLC read it. Then chop the file into several chunks with OP code identifiers, data signal and length bytes and see if VLC does the same thing. Later tard.

did you actually suggest illegal files become legal when they are segmented

Are you really unable to read, I was kind of joking but I think you may need help.

A quote from me, literally in this thread: "I don't give a fuck about the law"

I hope you are able to read this 🙏

ah yes, all this concern because the illegal files in your knots node are just in the "wrong" format

I see why you like children, you think like them.

There is a distinction here: whether it is fragmented or whole. Legally whole likely makes you more complicit than fragmented. I doubt it’ll stand up in court, but the case could be made. And that’s a risk. Surprised core does not wargame these types of scenarios with their updates …