So it is not given to a centralized authority, that is guided by for profit motives and also does the moderation of its plattform.
Where this can lead was shown with twiiter. The moment the central organization is captured, the central authority will abuse the authentification for its own goals. Then instead of just having to check for the authentification to be reliable you need to question everything that is on that plattform as a whole, which is infinetly more consuming, but also simply impossible.
This doesn’t appear to be given to a centralised authority. If the authentication process fails then it falls back to the previous method anyway. In reality most people won’t bother to authenticate if it involves any significant work.
So it is not given to a centralized authority, that is guided by for profit motives and also does the moderation of its plattform.
Where this can lead was shown with twiiter. The moment the central organization is captured, the central authority will abuse the authentification for its own goals. Then instead of just having to check for the authentification to be reliable you need to question everything that is on that plattform as a whole, which is infinetly more consuming, but also simply impossible.
This doesn’t appear to be given to a centralised authority. If the authentication process fails then it falls back to the previous method anyway. In reality most people won’t bother to authenticate if it involves any significant work.