The time for debate may be drawing to a close. There has to be a way to cure this malware attack. How about knots nodes checking blocks for correctness with the OP_Return data, removing it and storing a new hash for the block with the removed jpeg in the original op_return slot?
We need to find a way for Knots node runners to (k)not store CSAM nor forward it. We will have the majority BUT the SPAMMERS WILL GET CSAM into the chain... Thinking caps on time
Sent this to Luke
@Luke Dashjr and Mechanic
@Bitcoin Mechanic