I have zero interest in wading in fully to the micro-war, but I find it telling that “Have fun relaying CSAM” is a battle cry for the pro-Knots crowd. Reminds me of something.

I have zero interest in wading in fully to the micro-war, but I find it telling that “Have fun relaying CSAM” is a battle cry for the pro-Knots crowd. Reminds me of something.

Yup.
You know this did happen on BSV, right?
That something did happen, at least once, somewhere else, is the flaccid argument of petty tyrants everywhere.
I’m not well versed on this topic, so correct me if I’m wrong. If it becomes possible to embed files of significant size into the blockchain, a hostile actor could put CSAM into the Blockchain. This now means that every node runner now has CSAM on their computer, and the Feds now have an excuse (which the normies will easily buy, they know only what the corporate media wants them to know) to imprison anyone running a node. Is this not a threat?
Every combination of bytes exists in the chain data. The only thing that matters is how you serialize them. Without the serialization rules, are you expected to know what the bytes are supposed to prepresent?
Of course it’s all just zeros and ones. This sounds like the computer science equivalent of the “clump of cells” argument.
Are you trying to tell me that the feds wouldn’t know how to serialize the bytes on chain to see the images? And that somehow that would protect a node runner with child porn on their node?
No, that's not what I'm trying to tell you. Your analogies miss the point. Are you converting every OP_return to jpeg and decoding every inscription before you deem it safe to store on your harddrive? When you find a questionable one, is that the point at which you stop bitcoining? After all, you cant verify the chain without it. What about PNG, gif, etc? What about image protocols you don't even know about?
This is why I’m on the side of Knots.
We’re not trying to control Internet speech, we’re trying to have money at the base layer and not let bullshit get relayed through our nodes…
Big difference!
This Post is absolute Bullshit & a very high form of Gas Lighting!
You seem triggered, Jerry. Why is that?
And what about triggering malware detection in AWS?
Why would you run your node on someone else's computer?
I wouldn't trust a node running on a cloud provider VPS not to be tampered with, but that's besides the point.
If it turns out someone can kill all cloud provider hosted bitcoin nodes in one go by transmitting a virus payload in an OP_RETURN they should definitely do it.
If nothing else it would be an interesting stress test for the health of the network.
I doubt it would have much effect though, it's been a few years since I worked with AWS, but they didn't nuke ec2 instances left and right because of virus/botnet payloads being on disk. They nuked ec2 instances for tons of other reasons though 👌
Does knots also refuse to relay already-mined blocks/transactions containing what it defines to be spam? Are peers SOL in verifying the newest block if they only connect to knots?
No, it isn't telling at all. People with reason and good judgment don't want Bitcoin used for non-monetary purposes. Any such use adds risks and attack vectors. If you want to send messages and data or try get-rich-quick schemes, go do it somewhere else.