Resource Abuse that relies on storage (like Chia Mining, or Obfuscated Encrypted Storage (OES)) often relies on precise retrieval (i.e. the user expects to get the bytes they put in exactly when they download the file). If a platform is able to break that assumption, they're able to guard against these types of abuses by modulating the inputs slightly, so that legitimate users do not notice, but users just using the storage for its byte value will be stymied.
This is categorized as "Omission" because the platform is omitting the feature of 1:1, byte-for-byte upload:download.
Examples: