• MysteriousSophon21@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    True about the core protocols, but the ID verification is happening at the application layer where most people actually interact. The internet’s plumbing might be neutral, but the doors to websites/services are where the gatekeeping is happening. Reminds me of how China’s Great Firewall works - the packets flow freely but the endpoints are controlled.