New Members: Start Here!

Thank for your analysis. You raise problems that have been addressed again and again in this forum. Some have a clear answer while others involve a permanent discussion and search for possible solutions. I would be delighted if someone with knowledge would analyze in depth aspects such as observable fingerprint and the way to mitigate these problems.

On the control of the network by an attacker you can read topics like these:

Privacy and questionable content is a recurring theme:

And sustainability concerns too: