Conversation

Around 3 years ago when I started to look at how terrrorists might exploit blockchain tech in the future, one of the biggest concerns I had was the development of a decentralized social media channel. We’re seeing such experimentation now.
Quote Tweet
Islamic State supporters experiment with presence on BCM Messenger, an end-to-end encrypted messenger based on blockchain technology. In this example ISIS supporters share latest photo gallery showing a recent attack in Central Africa
Image
2
9
Standard problem: "taking down" is a term from central control & distribution. It assumes "everyone" sees this, but in most decent distributed networks, that's far from true. Moreover, identifying "everyone" in the distribution role becomes easy. Why don't bad guys livecast?