Wayback Machine back in read-only mode after DDoS, may need further maintenance.

    • Cyborganism@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      I don’t know if that’s a good idea.

      How would you go about implementing the infrastructure for that?

      • dohpaz42@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        That’s an excellent question. Unfortunately I do not have an answer. But I believe it’s worth discussing some means of redundancy for the IA; even if it’s as simple as rsync to other hosts.

    • Pasta Dental@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      2 months ago

      One of the rare use cases of a blockchain actually being useful. A federated internet archive that uses a blockchain to validate that the saved data has not been altered by a malicious actor trying to tamper with proofs

      That would be really cool but horribly inefficient because of the sheer amount of storage required

        • Pasta Dental@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          1
          ·
          2 months ago

          To be fair that would not necessarily be because of the blockchain part, more because of the decentralized/federated nature of this theorical network

      • WaterSword@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        The thing is sometimed articles must be removed from IA (copyright (I disagree with that one) or when information is leaked that could threaten lives), with a blockchain this would be impossible

        • tehmics@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 months ago

          this would be impossible

          Perfect.

          I’d be interested in seeing real examples where lives are threatened. I find it unlikely that the internet archive would be the exclusive arbiter of so-called deadly information

          • brbposting@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            I thought of something but I don’t know if it’s a good example.

            Here’s the hypothetical:

            A criminal backs up a CSAM archive. Maybe the criminal is caught, heck say they’re executed. Pedos can now share the archive forever over encrypted messengers without fear of it being deleted? Not ideal.

            • tehmics@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              2 months ago

              Yeah this is a hard one to navigate and it’s the only thing I’ve ever found that challenges my philosophy on the freedom of information.

              The archive itself isn’t causing the abuse, but CSAM is a record of abuse and we restrict the distribution not because distribution or possession of it is inherently abusive, but because the creation of it was, and we don’t want to support an incentive structure for the creation of more abuse.

              i.e. we don’t want more pedos abusing more kids with the intention of archival/distribution. So the archive itself isn’t the abuse, but the incentive to archive could be.

              There’s also a lot of questions with CSAM in general that come up about the ethics of it in that I think we aren’t ready to think about. It’s a hard topic all around and nobody wants to seriously address it beyond virtue signalling about how bad it is.

              I could potentially see a scenario where the archival could be beneficial to society similar to the FBI hash libraries Apple uses to scan iCloud for CSAM. If we throw genAI at this stuff to learn about it, we may be able to identify locations, abusers and victims to track them down and save people. But it would necessitate the existence of the data to train on.

              I could also see potential for using CSAM itself for psychotherapy. Imagine a sci-fi future where pedos are effectively cured by using AI trained on CSAM to expose them to increasingly mature imagery, allowing their attraction to mature with it. We won’t really know if something like that is possible if we delete everything. It seems awfully short sighted to me to delete data no matter how perverse, because it could have legitimate positive applications that we haven’t conceived of yet. So to that end, I do hope some 3 letter agencies maintain their restricted archives of data for future applications that could benefit humanity.

              All said, I absolutely agree that the potential of creating incentives for abusers to abuse is a major issue with immutable archival, and it’s definitely something that we need to figure out, before such an archive actually exists. So thank you for the thought experiment.

      • kautau@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        I mean you don’t need the blockchain for that. The same way that distro mirrors don’t need the blockchain. It can be federated, with each upload being verified through hashes that they are in fact the real upload. I would argue that something like blockchain would remove the authority from them, granting the position of a bad actor spinning up enough servers to be able to poison the blockchain just because they had the computing power, claiming authority

      • _NoName_@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        We don’t need a blockchain for that.

        Having multiple servers which store file checksums would have much less overhead, would be easily repeatable and appendable, with no need for unnecessary computational labor. Linux mint currently uses the checksum process for verifying that an ISO downloaded is not altered in any way, and it can work for any file (preferably not humongous files).

        Strive for K.I.S.S. whenever possible.

  • Gestrid@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    It’s worth noting that the saved pages are the only thing that are back for now. Their other services have not yet been brought back online.

  • Dharma Curious (he/him)@slrpnk.net
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I realize it’s like the least important aspect of this, but yay! My podcast is back! I listen to Lawrence Manzo’s Mahabharata podcast every night to go to sleep, and I haven’t slept well since the attack

    • pHr34kY@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      2 months ago

      This is why it breaks. It’s not a streaming CDN. Do you torrent over tor as well?

      • Dharma Curious (he/him)@slrpnk.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        I use a podcast app, and apparently it pulls from there. I never knew before it went down. But I tried a bunch of different apps over the course of this, and they all pull from that.