FR#150 – On ICE, Verification, and Presence as Harm
Summary
The article analyzes Bluesky's ICE verification and argues that verification systems interact with distinct network architectures (ActivityPub vs AT Protocol) in ways that shape presence-based harm and moderation. It highlights the tension between on-platform rules and off-platform behavior, critiques centralized moderation, and discusses the implications of infrastructure versus application design for trust and safety.