Quote:
Originally Posted by LeftySmith
So now I'm guessing you want option #1, no more anonymous browsing?
|
My request was more limited than what you've described.
The limit of the technical solution I recommended was to take the behavior of the Ignore List and flip that capability inside out so that an individual (Person A) would essentially be able to force themselves on to a particular individual's Ignore List (Person B). There are at least two design alternatives that could be evaluated.
1. Implement the same capability of the Ignore List in a Protect List format relying on some of the code used for the Ignore List. This would be able to be managed through the Control Panel.
2. Writing what feels like a smaller amount of code so that an individual can put themselves on to someone's Ignore List.
3. Some other approach that a real software engineer came up with based on real knowledge of the code.
Can these be defeated by having Person B browse the forums without logging in?
Yes... to an extent. Person B would still have to log in so that he or she could submit a post. While logged in, he or she could not see the writings of Person A. Person A's comments would be collapsed the same way that someone on Person A's Ignore List collapse in the current software implementation. As a result, Person B would have to have a greater level of motivation to step on Person A's posts than what he or she needs currently.
To your point, it would be reasonably easy for Person B to defeat the protection status chosen by Person A.
However, I do not think that more sophisticated approaches to further increase that protection status would be worth the investment. More sophisticated approaches can also be defeated by a motivated Person B using low tech techniques such as Person B maintaining a secondary ('sock puppet') account or by having one of their friends, Person C, copy and paste Person A's posts in email or PM to Person B.
The approach I'm recommending is intended as a clear signal to Person B that they are being ignored and provides a limited technical barrier making it moderately more inconvenient for Person B to respond to Person A. It provides a gradation of enhanced protection and not comprehensive protection.
My proposal was based on the apparently flawed assumption that this new feature would not require a great deal of programming. From the feedback above, it seems like I was mistaken.
There may be some that would want the technical solution you've suggested. I am not one of those people.
Thank you for considering this thread's proposal.