Replying to Avatar Luxas

Lmao...

What techniques nostr relays/clients deploy to prevent spreading of csam?

Reply to this note

Please Login to reply.

Discussion

It seems to be a combination of reports, WoT, client side and relay filtering. Also pretty stupid to share here with the required cryptographic signing of the crime.

What makes it stupid to sign it and share it?

Curious about tech details.

Per my understanding keys can be destroyed. Which means there are infinite anonymous pairs of keys available to anyone.

You are correct. Signing it doesn't stop bad actors.

csam?