this post was submitted on 01 Aug 2025
46 points (97.9% liked)

Privacy

6977 readers
50 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/34006757

you are viewing a single comment's thread
view the rest of the comments

True about the core protocols, but the ID verification is happening at the application layer where most people actually interact. The internet's plumbing might be neutral, but the doors to websites/services are where the gatekeeping is happening. Reminds me of how China's Great Firewall works - the packets flow freely but the endpoints are controlled.