

How do you handle this part with the above one (exploited, manipulated) ?
It’s one thing to have systemic corruption and exploitation (what Big Tech does), it’s another to have endemic issues (bad actors, small-scale scammers, etc). The former can not be neutralized by individual/localized action, the latter can.











I would argue the opposite, actually. A lot of this data could be distributed in a p2p manner and the client nodes would have to rely even less on the servers. The key part would be that this data would have to be self-authenticating, but we do have the mechanisms to do that (Linked Data Signatures)