True, but I find it very
Antiabusers wouldn't need to access content. They can downvote on layer 1 as layer 1 rewards are enabled. No need to pay $ to access for downvoting. If nobody wants they to interfere, solution is to decline Layer 1 SHARED AUTHORS REWARD POOL.
Remember that, I use downvotes as my last resort. I might sound like a pro downvoters but I am not. I think you know me better :)
Even if the content is encrypted? I understand your point, I just don't think those authors are going to decline the rewards, I suppose there will be a lot of crying.
I guess a little better, but that doesn't mean I've lost respect for you. And this is because you have given me a couple of lessons about your culture, and you have earned my respect because of that.🤗
That's what I mentioned about flag wars. Crying will not be one sided. In wars every looses.
You might even realize, I am not doing it for me. I am doing it for hive. Or I am not even doing anything, just raising my concerns related to upcoming storm.
And I agree with you, I see a big storm coming. What surprises me is the ability you have to get into them, I guess you enjoy it 😀
I apologize for the comment in Spanish, I forgot to translate it, but I have already corrected it
Translating content is not a big deal for me. I remember catching an Indian abuser a long time ago. He plagiarized arabic language newspaper and wrote English post. Word to word. When you will read 10s of blogs a day, just by looking at content it's easier to spot the bad eggs.
Well, can't say the same if content is encrypted and leaking our hive reward pool :)
Edit: @manclar I still remember his name: @ funnyman
I can't just spot abusers (simply by looking at content) but can remember their names from past too.
And I am not paid by anyone for this work. Everyone of us who has Hive stake, has a responsibility to protect hive from leakages. We all play our part in the grand scheme of things.
I have doubts, I'm going to do some tests because your comment has raised a question for me. Is it possible that in encrypted content there is a common pattern of repetition of vowels, consonants and words? I think it will be interesting to do some tests with 256 hash and analyze some results. In my free time I am going to try the Spanish and English languages, checking results, and I may even make a publication as a curiosity about it, I find it interesting.