Comment by daveoc64
2 days ago
>Why are such technologies still possible, even after we've learned lessons from email and other legacy tech over the past several decades?
The alternative seems far more disappointing from an engineering and architecture perspective to me - not bothering to implement any features because of fears that they may be abused.
I'm doubly disappointed because of your comment because that is not the alternative. You implement the technology with user experience as #1 priority and build layers upon layers of defenses against abuse and with trust establishment as its foundation.