RSS Bot@lemmy.bestiver.seMB to Hacker News@lemmy.bestiver.seEnglish · 3 days agoLet's knock down social media's walled gardens – Tim Berners-Leewww.ft.comexternal-linkmessage-square6fedilinkarrow-up14arrow-down10file-text
arrow-up14arrow-down1external-linkLet's knock down social media's walled gardens – Tim Berners-Leewww.ft.comRSS Bot@lemmy.bestiver.seMB to Hacker News@lemmy.bestiver.seEnglish · 3 days agomessage-square6fedilinkfile-text
minus-squaretenchiken@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up0·edit-23 days agoUhhh… Your linked article just repeatedly says “this isn’t enough, he needs to go after walled gardens!”… Isn’t this new one just that? How is he a bad person for saying “what if we tried improving things a little?” Yes, it’s not super aggressive like forcing the entirety of the Web into anarchy, but at this point we need any and all improvement. Unless you have Epstein’s logs showing him a kiddy toucher, I doubt he’s a bad person based on provided info…
minus-square反いじめ戦隊@ani.sociallinkfedilinkEnglisharrow-up1·2 days agoMy server was down, so I had to manually fetch your reply. His response is the exact same walled garden everyone has. By revamp, I meant this: https://en.wikipedia.org/wiki/Content_centric_networking https://wiki.fd.io/view/Cicn The raw problem is DDoS. How do you mitigate DDoS?
Uhhh… Your linked article just repeatedly says “this isn’t enough, he needs to go after walled gardens!”…
Isn’t this new one just that?
How is he a bad person for saying “what if we tried improving things a little?”
Yes, it’s not super aggressive like forcing the entirety of the Web into anarchy, but at this point we need any and all improvement.
Unless you have Epstein’s logs showing him a kiddy toucher, I doubt he’s a bad person based on provided info…
My server was down, so I had to manually fetch your reply.
His response is the exact same walled garden everyone has.
By revamp, I meant this: https://en.wikipedia.org/wiki/Content_centric_networking https://wiki.fd.io/view/Cicn
The raw problem is DDoS. How do you mitigate DDoS?