My issue is that if a bad actor wants to use CSAM as an attack, a change that doesn’t make it impossible is pointless.
Login to reply
Replies (1)
In the end, things are not binary. Default relay policy matter: entering a deal with a miner to put CP on the chain is a very identifiable way to do something illegal, which is not comfortable for the potential miner and the user that does it. Much easier for bad actors if non identifiable and miner can say not on purpose.