Wayback Machine back in read-only mode after DDoS, may need further maintenance.

    • Pasta Dental@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      91
      arrow-down
      16
      ·
      2 months ago

      One of the rare use cases of a blockchain actually being useful. A federated internet archive that uses a blockchain to validate that the saved data has not been altered by a malicious actor trying to tamper with proofs

      That would be really cool but horribly inefficient because of the sheer amount of storage required

        • Pasta Dental@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          14
          arrow-down
          1
          ·
          2 months ago

          To be fair that would not necessarily be because of the blockchain part, more because of the decentralized/federated nature of this theorical network

      • kautau@lemmy.world
        link
        fedilink
        English
        arrow-up
        44
        ·
        2 months ago

        I mean you don’t need the blockchain for that. The same way that distro mirrors don’t need the blockchain. It can be federated, with each upload being verified through hashes that they are in fact the real upload. I would argue that something like blockchain would remove the authority from them, granting the position of a bad actor spinning up enough servers to be able to poison the blockchain just because they had the computing power, claiming authority

        • explodicle@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          7
          ·
          2 months ago

          Bro hear me out bro

          We put the whole thing on a blockchain. BUT

          • entry order isn’t super important

          • you don’t need to validate the entire archive

          So basically a blockchain, but for a bunch of files, not ordered. So instead of a native token, users can just trade bits of information as currency. 🙀

          If it goes really well, we could even recruit one of the Bitcoin developers to help.

        • kautau@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          2 months ago

          Yes, this is a great example of where ipfs would work (specifically for file hosting, not necessarily for the actual web interface), and also, no ipfs is not a blockchain, and it shouldn’t be. I thought we were past the whole “can this be a blockchain” thing, but here we are. Blockchain is cool tech. It’s also incredibly inefficient for anything beyond a transaction ledger, or in today’s case, money laundering and trying to avoid taxes and regulation.

      • WaterSword@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        2 months ago

        The thing is sometimed articles must be removed from IA (copyright (I disagree with that one) or when information is leaked that could threaten lives), with a blockchain this would be impossible

        • tehmics@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          4
          ·
          2 months ago

          this would be impossible

          Perfect.

          I’d be interested in seeing real examples where lives are threatened. I find it unlikely that the internet archive would be the exclusive arbiter of so-called deadly information

          • WaterSword@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            1
            ·
            2 months ago

            There was an actual example where a journalistic article about afghanistan accidentally leaked names of some sources and people who helped westerners in afghanistan, which did actually endanger those people’s lives.

            • tehmics@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              1
              ·
              2 months ago

              If they’re leaked, they’re leaked. The archive doesn’t change that one way or the other

              • douglasg14b@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                edit-2
                2 months ago

                Gotcha so you actually stated your previous question in bad faith as you had no interest in the answer to begin with.

                • tehmics@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  2 months ago

                  No. The archive of it isn’t doing the dangerous part. The info was already out there and the bad actor who would do something malicious would get that info from the same place the archive did. I need you to show how the archival of information that was already released leads to a dangerous situation that didn’t already exist.

          • brbposting@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 months ago

            I thought of something but I don’t know if it’s a good example.

            Here’s the hypothetical:

            A criminal backs up a CSAM archive. Maybe the criminal is caught, heck say they’re executed. Pedos can now share the archive forever over encrypted messengers without fear of it being deleted? Not ideal.

            • tehmics@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              2 months ago

              Yeah this is a hard one to navigate and it’s the only thing I’ve ever found that challenges my philosophy on the freedom of information.

              The archive itself isn’t causing the abuse, but CSAM is a record of abuse and we restrict the distribution not because distribution or possession of it is inherently abusive, but because the creation of it was, and we don’t want to support an incentive structure for the creation of more abuse.

              i.e. we don’t want more pedos abusing more kids with the intention of archival/distribution. So the archive itself isn’t the abuse, but the incentive to archive could be.

              There’s also a lot of questions with CSAM in general that come up about the ethics of it in that I think we aren’t ready to think about. It’s a hard topic all around and nobody wants to seriously address it beyond virtue signalling about how bad it is.

              I could potentially see a scenario where the archival could be beneficial to society similar to the FBI hash libraries Apple uses to scan iCloud for CSAM. If we throw genAI at this stuff to learn about it, we may be able to identify locations, abusers and victims to track them down and save people. But it would necessitate the existence of the data to train on.

              I could also see potential for using CSAM itself for psychotherapy. Imagine a sci-fi future where pedos are effectively cured by using AI trained on CSAM to expose them to increasingly mature imagery, allowing their attraction to mature with it. We won’t really know if something like that is possible if we delete everything. It seems awfully short sighted to me to delete data no matter how perverse, because it could have legitimate positive applications that we haven’t conceived of yet. So to that end, I do hope some 3 letter agencies maintain their restricted archives of data for future applications that could benefit humanity.

              All said, I absolutely agree that the potential of creating incentives for abusers to abuse is a major issue with immutable archival, and it’s definitely something that we need to figure out, before such an archive actually exists. So thank you for the thought experiment.

      • _NoName_@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        We don’t need a blockchain for that.

        Having multiple servers which store file checksums would have much less overhead, would be easily repeatable and appendable, with no need for unnecessary computational labor. Linux mint currently uses the checksum process for verifying that an ISO downloaded is not altered in any way, and it can work for any file (preferably not humongous files).

        Strive for K.I.S.S. whenever possible.

      • Valmond@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        2 months ago

        You need a useless 51% of good nodes to assure that, making it even more wasteful.

    • Cyborganism@lemmy.ca
      link
      fedilink
      English
      arrow-up
      18
      ·
      2 months ago

      I don’t know if that’s a good idea.

      How would you go about implementing the infrastructure for that?

      • dohpaz42@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        That’s an excellent question. Unfortunately I do not have an answer. But I believe it’s worth discussing some means of redundancy for the IA; even if it’s as simple as rsync to other hosts.

    • LunchMoneyThief@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      YaCy self-hostable search engine kind of has this feature and architecture by way of a DHT inter-peer search, in combination with local page caching. Although the caching feature is something that a node operator needs to manually enable.