I thought of a completely trivial way for #Mastodon to implement all their soft security stuff w/o content leaking when it federates to incompatible servers.
It's such an obvious idea that I can't help but wonder if @Gargron is already doing it...
The idea: Put sensitive content in a non-standard XML element (e.g. <scopedcontent> instead of <content>). Poof, the problem just goes away, until a node is actually malicious.
@Gargron @JollyOrc Hmm. I don't think your real solution is a realistic expectation.
That is a lot of work which is easy for a computer but hard for a human. A prime candidate for automation.
If that's your preference AND you want to help people not make mistakes... then you probably shouldn't show the option at all until they (or The Computer) have reviewed their follower list.
Oh well. At least the ideas are on your radar.
I agree: The system should, where feasible, give people some sort of indication if it detects followers from a "bad" instance that doesn't conform to the standards.
Of course, that cannot solve human malciousness or other PEBCAK issues. And we probably really don't want a codified reputation system...
@JollyOrc @Gargron ... you've also really badly confused the very human task of "knowing your followers" with the completely geeky and unreasonable task of "knowing what software your followers use and how it behaves."
Those are really not the same things, at all.