If you look at the nodes which are most likely to trigger from given inputs then you can draw paths
Natanael
You can't use a MAC for public key signatures. That's ECC, RSA, and similar.
Not in ActivityPub no.
The main privacy/security issue is mostly mitigated by the fact that there's a sync behavior for accounts and follows and distribution of content where the host can push revocation messages, triggering other servers to delete follows and wipe cached account data originating from that hosting server, which means that somebody who takes over a domain after a wipe can't imitate the exact same accounts. But old links can still be redirected because there's no way to verify what they were supposed to point to, so some degree of impersonation remains possible unless other servers agree to preemptively defederate...
It's really only long range travel away from grids (like maybe autonomous trucks traveling through very large unpopulated areas, but not on rail or boat) where hydrogen has meaningful advantages due to energy density. Anywhere else there's something else which is comparable or better.
Hydrogen is simply less efficient. Switching to it would increase total load on the grid, even if you try to distribute production then the losses takes away available energy for other uses. At some point it becomes cheaper to invest to connect the grid together.
It can be through electrolysis, but it is almost never done that way. It's less efficient than simply using the grid to charge batteries, in that usecase the ONLY benefit it has its energy density (and that might not last either).
In practice the main source is as a byproduct from refining fossil fuel like oil or gas which is separated and collected.
Perceptual hash collision generators can take arbitrary images and tweak them in invisible ways to make them collide with whichever hash value you want.
Trusted timestamping protocols and transparency logs exists and does that more efficiently
Positioning using distance bounded challenge-response protocols with multiple beacons is possible, but none of the positioning satellite networks supports it. And you still can't prove the photo was taken at the location, only that somebody was there.
Codes which don't embedd any information about what you're saying or doing can be copied over to faked images.
In theory you could have such a pendant record your voice, etc, and continously emit signatures for compressed versions of your speech (or a signed speech-to-text transcript)
No, it took a week to refine the attack algorithm, the collision generation itself is fast
The point of perceptual hashes is to let you check if two things are similar enough after transformations like scaling and reencoding, so you can't rely on that here