Too often, experts argue, the problem of targeted dissemination or distribution of critical content can only be solved by addressing the operator of a digital platform. The relevant content is ultimately deposited on the platform's digital infrastructure, and only the operator can delete the data physically.
The method we developed shows that sovereignty over the operator's infrastructure is not a prerequisite for using an existing digital platform to digital platform to exchange content in a trusted manner - see chapter 12.3 - Product and service portfolio / Privacy Enhancing Technology Privacy Protection / Privacy Enhancing Technology (PET).
When considering several factors, the conclusion is that the present paper's problem must be assigned to a higher order. The problems/challenges
It is essential to understand that the problem definition in its overall effect is by the model of interaction pursued by the operator for the fact that a controlled interaction model followed by the operator that held and targeted distribution and dissemination of the content of any kind can take place at all.
Since an operator does not distance himself from the monetization model pursued over a medium- to Since an operator will not distance himself from the monetization model pursued over a medium- to long-term period, both problems continue to exist.
For some time now, there has been a demand to ensure privacy protection also in digital environments. Despite this, no effective procedure has been established to protect the individual's position against the self-interest of the operator of a digital platform.
To address these problems nevertheless, the requirement must be to face the problem from the user's point of view. In order to do so, the problem considered in this paper is based on the method developed in the PET component.