this post was submitted on 23 Nov 2024
461 points (96.2% liked)
Showerthoughts
30226 readers
676 users here now
A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. The most popular seem to be lighthearted, clever little truths, hidden in daily life.
Here are some examples to inspire your own showerthoughts: 1
Rules
- All posts must be showerthoughts
- The entire showerthought must be in the title
- No politics
- If your topic is in a grey area, please phrase it to emphasize the fascinating aspects, not the dramatic aspects. You can do this by avoiding overly politicized terms such as "capitalism" and "communism". If you must make comparisons, you can say something is different without saying something is better/worse.
- A good place for politics is c/politicaldiscussion
- If you feel strongly that you want politics back, please volunteer as a mod.
- Posts must be original/unique
- Adhere to Lemmy's Code of Conduct
If you made it this far, showerthoughts is accepting new mods. This community is generally tame so its not a lot of work, but having a few more mods would help reports get addressed a little sooner.
Whats it like to be a mod? Reports just show up as messages in your Lemmy inbox, and if a different mod has already addressed the report the message goes away and you never worry about it.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The data would be hashed so any changes would be thrown out.
Hashed by whom? Who has the source of truth for the hashes? How would you prevent it from being poisoned? .. or are you saying a non-distributed (centralized) hash store?
If centralized: you have a similar problem to IA today. If not centralized: How would you prevent poisoning? If enough distributed nodes say different things, the truth can be lost.
This is a topic that is pretty well tested. Basically the data is validated when received.
For instance in IPFS data is tracked by its hash. You request something by a CID which is just a hash.
There are other distributed networks and they all have there own ways of protecting against attacks. Usually an attack requires a huge amount of resources.
Even in ipfs, I don't understand discoverability. Sort of sounds like it still needs a centralized list of metadata to content I'd, etc.