It has adjustable block size and computational cost limits through miner voting, NiPoPoWs enable efficient light clients. Storage Rent cleans up old boxes every four years. Pruned (full) node using a UTXO Set Snapshot is already possible.
Plus you don’t need to bloat the L1, can be done off-chain and authenticated on-chain using highly efficient authenticated data structures.
Know IRL? Seems it would inherently limit discoverability and openness. New users or those outside the immediate social graph would face significant barriers to entry and still vulnerable to manipulation, such as bots infiltrating through unsuspecting friends or malicious actors leveraging connections to gain credibility.
Not the good ones, many conversations online are fleeting. Those tell-tale signs can be removed with the right prompt and context. We’re post turing in the sense that in most interactions online people wouldn’t be able to tell they were speaking to a bot, especially if they weren’t looking - which most aren’t.