Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I would like to give an update on "federation" on Bluesky.

I would like to give an update on "federation" on Bluesky.

Scheduled Pinned Locked Moved Uncategorized
342 Posts 109 Posters 884 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mcc@mastodon.socialM mcc@mastodon.social

    @trwnh yes, that's why in my example I picked the first three letters of "kademlia"

    trwnh@mastodon.socialT This user is from outside of this forum
    trwnh@mastodon.socialT This user is from outside of this forum
    trwnh@mastodon.social
    wrote on last edited by
    #151

    @mcc ah, i missed that part ^^;

    1 Reply Last reply
    0
    • trwnh@mastodon.socialT trwnh@mastodon.social

      @mcc @erincandescent @ikuturso @jrose i think this effectively amounts to "just use a dht that everyone agrees on"

      erincandescent@akko.erincandescent.netE This user is from outside of this forum
      erincandescent@akko.erincandescent.netE This user is from outside of this forum
      erincandescent@akko.erincandescent.net
      wrote on last edited by
      #152

      @trwnh @mcc @ikuturso @jrose In did:plc:foo, foo is a base32(sha256(creation_request))[0:20] so its a 120-bit hash. I’m not confident of that’s long term security

      Also the did:plc update metadata protocol is fundamentally dependent upon the existence of a central trusted system so you can’t just easily replicate it as a DHT system

      trwnh@mastodon.socialT erincandescent@akko.erincandescent.netE fontenot@mastodon.socialF 3 Replies Last reply
      0
      • trwnh@mastodon.socialT trwnh@mastodon.social

        @lrhodes @mat @mcc @alter_kaker @esoteric_programmer """fun""" fact btw: canonicity of at:// uri is different depending on whether you use the did or dns as the authority. so at://atproto.com has different properties than at://did:plc:ewvi7nxzyoun6zhxrhs64oiz -- the former will break if the dns handle ever changes, and the latter is supposed to be used whenever canonical references are needed. but guess which one gets exposed to user-facing stuff? that's right, did is backend, dns is frontend.

        E This user is from outside of this forum
        E This user is from outside of this forum
        esoteric_programmer@social.stealthy.club
        wrote on last edited by
        #153

        @trwnh @lrhodes @mat @mcc @alter_kaker I thought @user.domain.tld is just a way to point to @did:plc:blahblahblah, the same way we do with webfinger over here. Wouldn't this difference in the protocol make an impersonation attack more possible?

        trwnh@mastodon.socialT 1 Reply Last reply
        0
        • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

          @trwnh @mcc @ikuturso @jrose In did:plc:foo, foo is a base32(sha256(creation_request))[0:20] so its a 120-bit hash. I’m not confident of that’s long term security

          Also the did:plc update metadata protocol is fundamentally dependent upon the existence of a central trusted system so you can’t just easily replicate it as a DHT system

          trwnh@mastodon.socialT This user is from outside of this forum
          trwnh@mastodon.socialT This user is from outside of this forum
          trwnh@mastodon.social
          wrote on last edited by
          #154

          @erincandescent @ikuturso @mcc @jrose i think you could replace it with signed updates but in doing so, you've basically just wrapped around to needing a pki

          mcc@mastodon.socialM rakoo@blah.rako.spaceR 2 Replies Last reply
          0
          • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

            @trwnh @mcc @ikuturso @jrose In did:plc:foo, foo is a base32(sha256(creation_request))[0:20] so its a 120-bit hash. I’m not confident of that’s long term security

            Also the did:plc update metadata protocol is fundamentally dependent upon the existence of a central trusted system so you can’t just easily replicate it as a DHT system

            erincandescent@akko.erincandescent.netE This user is from outside of this forum
            erincandescent@akko.erincandescent.netE This user is from outside of this forum
            erincandescent@akko.erincandescent.net
            wrote on last edited by
            #155

            @trwnh @ikuturso @jrose @mcc there are broadly 3 types of DID that exist at the moment:

            1. Fixed unchangable keys (did:key)
            2. Depend upon central system for updates (did:web, did:plc); did:web is decentralised in the sense anyone can run a server for said DIDs but a given DID is always tied to a given DNS domain
            3. Dependent upon a blockchain for updates (most of them)
            mcc@mastodon.socialM 1 Reply Last reply
            0
            • trwnh@mastodon.socialT trwnh@mastodon.social

              @erincandescent @ikuturso @mcc @jrose i think you could replace it with signed updates but in doing so, you've basically just wrapped around to needing a pki

              mcc@mastodon.socialM This user is from outside of this forum
              mcc@mastodon.socialM This user is from outside of this forum
              mcc@mastodon.social
              wrote on last edited by
              #156

              @trwnh @erincandescent @ikuturso @jrose this raises an important question. Why the fuck are we not just using a pki to start with

              erincandescent@akko.erincandescent.netE trwnh@mastodon.socialT 2 Replies Last reply
              0
              • E esoteric_programmer@social.stealthy.club

                @trwnh @lrhodes @mat @mcc @alter_kaker I thought @user.domain.tld is just a way to point to @did:plc:blahblahblah, the same way we do with webfinger over here. Wouldn't this difference in the protocol make an impersonation attack more possible?

                trwnh@mastodon.socialT This user is from outside of this forum
                trwnh@mastodon.socialT This user is from outside of this forum
                trwnh@mastodon.social
                wrote on last edited by
                #157

                @esoteric_programmer @lrhodes @mat @mcc @alter_kaker you are *supposed* to "convert" the user.domain.tld to did:plc:blah, but you can still construct references against user.domain.tld. but you're not supposed to. but every user-facing component only shows you the user.domain.tld instead of the did:plc:blah, so if you're just copying from your address bar, you are going to get the "wrong" identifier most likely.

                it has the exact same properties as letting a dns name lapse and get reassigned.

                E 1 Reply Last reply
                0
                • mcc@mastodon.socialM mcc@mastodon.social

                  @trwnh @erincandescent @ikuturso @jrose this raises an important question. Why the fuck are we not just using a pki to start with

                  erincandescent@akko.erincandescent.netE This user is from outside of this forum
                  erincandescent@akko.erincandescent.netE This user is from outside of this forum
                  erincandescent@akko.erincandescent.net
                  wrote on last edited by
                  #158

                  @mcc @trwnh @ikuturso @jrose did:plc is using a PKI but it also provides ways of doing account recovery that pure-PKI systems fail to acheive

                  erincandescent@akko.erincandescent.netE trwnh@mastodon.socialT mcc@mastodon.socialM 3 Replies Last reply
                  0
                  • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                    @mcc @trwnh @ikuturso @jrose did:plc is using a PKI but it also provides ways of doing account recovery that pure-PKI systems fail to acheive

                    erincandescent@akko.erincandescent.netE This user is from outside of this forum
                    erincandescent@akko.erincandescent.netE This user is from outside of this forum
                    erincandescent@akko.erincandescent.net
                    wrote on last edited by
                    #159

                    @mcc @ikuturso @jrose @trwnh basically it kind of comes down to average people are not great at handling cryptographic keys

                    1 Reply Last reply
                    0
                    • mcc@mastodon.socialM mcc@mastodon.social

                      @trwnh @erincandescent @ikuturso @jrose this raises an important question. Why the fuck are we not just using a pki to start with

                      trwnh@mastodon.socialT This user is from outside of this forum
                      trwnh@mastodon.socialT This user is from outside of this forum
                      trwnh@mastodon.social
                      wrote on last edited by
                      #160

                      @mcc @erincandescent @ikuturso @jrose uhhhh

                      "key management hard", basically

                      erincandescent@akko.erincandescent.netE 1 Reply Last reply
                      0
                      • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                        @trwnh @ikuturso @jrose @mcc there are broadly 3 types of DID that exist at the moment:

                        1. Fixed unchangable keys (did:key)
                        2. Depend upon central system for updates (did:web, did:plc); did:web is decentralised in the sense anyone can run a server for said DIDs but a given DID is always tied to a given DNS domain
                        3. Dependent upon a blockchain for updates (most of them)
                        mcc@mastodon.socialM This user is from outside of this forum
                        mcc@mastodon.socialM This user is from outside of this forum
                        mcc@mastodon.social
                        wrote on last edited by
                        #161

                        @erincandescent i think in order to solve this problem without centralization you do need a ledger ("blockchain"). That's simply the way to get a canonically agreed on ordering of events. I think there are some reasons to go with a data structure *other* than literal blockchain for your ledger. But if you create a canonically agreed on ordering of events (which as far as I'm concerned you need if you want to support key rotation/did changes) then more or less by definition you've made a ledger

                        tryst@fedi.imu.liT dalias@hachyderm.ioD 2 Replies Last reply
                        0
                        • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                          @mcc @trwnh @ikuturso @jrose did:plc is using a PKI but it also provides ways of doing account recovery that pure-PKI systems fail to acheive

                          trwnh@mastodon.socialT This user is from outside of this forum
                          trwnh@mastodon.socialT This user is from outside of this forum
                          trwnh@mastodon.social
                          wrote on last edited by
                          #162

                          @erincandescent @ikuturso @mcc @jrose isn't plc basically custodial keys?

                          erincandescent@akko.erincandescent.netE 1 Reply Last reply
                          0
                          • trwnh@mastodon.socialT trwnh@mastodon.social

                            @mcc @erincandescent @ikuturso @jrose uhhhh

                            "key management hard", basically

                            erincandescent@akko.erincandescent.netE This user is from outside of this forum
                            erincandescent@akko.erincandescent.netE This user is from outside of this forum
                            erincandescent@akko.erincandescent.net
                            wrote on last edited by
                            #163

                            @trwnh @mcc @ikuturso @jrose thinking about how my PGP key expires because the certification key was on a yubikey in a bank vault in a different country

                            1 Reply Last reply
                            0
                            • trwnh@mastodon.socialT trwnh@mastodon.social

                              @erincandescent @ikuturso @mcc @jrose isn't plc basically custodial keys?

                              erincandescent@akko.erincandescent.netE This user is from outside of this forum
                              erincandescent@akko.erincandescent.netE This user is from outside of this forum
                              erincandescent@akko.erincandescent.net
                              wrote on last edited by
                              #164

                              @trwnh @ikuturso @mcc @jrose uhh i thought the custody was being done by the appview or pds but i don’t remember the details

                              1 Reply Last reply
                              0
                              • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                                @mcc @trwnh @ikuturso @jrose did:plc is using a PKI but it also provides ways of doing account recovery that pure-PKI systems fail to acheive

                                mcc@mastodon.socialM This user is from outside of this forum
                                mcc@mastodon.socialM This user is from outside of this forum
                                mcc@mastodon.social
                                wrote on last edited by
                                #165

                                @erincandescent I have an entirely workable proposal for how to achieve that in a distributed system, which the mastodon dot social post length is too small to contain

                                ireneista@adhd.irenes.spaceI 1 Reply Last reply
                                0
                                • trwnh@mastodon.socialT trwnh@mastodon.social

                                  @esoteric_programmer @lrhodes @mat @mcc @alter_kaker you are *supposed* to "convert" the user.domain.tld to did:plc:blah, but you can still construct references against user.domain.tld. but you're not supposed to. but every user-facing component only shows you the user.domain.tld instead of the did:plc:blah, so if you're just copying from your address bar, you are going to get the "wrong" identifier most likely.

                                  it has the exact same properties as letting a dns name lapse and get reassigned.

                                  E This user is from outside of this forum
                                  E This user is from outside of this forum
                                  esoteric_programmer@social.stealthy.club
                                  wrote on last edited by
                                  #166

                                  @trwnh @lrhodes @mat @mcc @alter_kaker This is offtopic in a way, but oho, I didn't have to look too deeply to find this:
                                  https://github.com/qwell/bsky-exploits
                                  nothing extremely serious, but could be used for fishing campaigns and the like pretty easily

                                  1 Reply Last reply
                                  0
                                  • mcc@mastodon.socialM mcc@mastodon.social

                                    @erincandescent I have an entirely workable proposal for how to achieve that in a distributed system, which the mastodon dot social post length is too small to contain

                                    ireneista@adhd.irenes.spaceI This user is from outside of this forum
                                    ireneista@adhd.irenes.spaceI This user is from outside of this forum
                                    ireneista@adhd.irenes.space
                                    wrote on last edited by
                                    #167

                                    @mcc @erincandescent we should sync up about that at some point, we've thought about it also and it'd be a shame to never turn it into a spec

                                    ireneista@adhd.irenes.spaceI 1 Reply Last reply
                                    0
                                    • ireneista@adhd.irenes.spaceI ireneista@adhd.irenes.space

                                      @mcc @erincandescent we should sync up about that at some point, we've thought about it also and it'd be a shame to never turn it into a spec

                                      ireneista@adhd.irenes.spaceI This user is from outside of this forum
                                      ireneista@adhd.irenes.spaceI This user is from outside of this forum
                                      ireneista@adhd.irenes.space
                                      wrote on last edited by
                                      #168

                                      @mcc @erincandescent the historical answer to why atproto isn't using traditional PKI, as far as we can tell, is that the authors were under the impression DID is a lot more useful than it is. just a guess on our part.

                                      1 Reply Last reply
                                      0
                                      • mcc@mastodon.socialM mcc@mastodon.social

                                        @erincandescent i think in order to solve this problem without centralization you do need a ledger ("blockchain"). That's simply the way to get a canonically agreed on ordering of events. I think there are some reasons to go with a data structure *other* than literal blockchain for your ledger. But if you create a canonically agreed on ordering of events (which as far as I'm concerned you need if you want to support key rotation/did changes) then more or less by definition you've made a ledger

                                        tryst@fedi.imu.liT This user is from outside of this forum
                                        tryst@fedi.imu.liT This user is from outside of this forum
                                        tryst@fedi.imu.li
                                        wrote on last edited by
                                        #169

                                        @mcc@mastodon.social @erincandescent@erincandescent.net are you claiming that 90s pattern of long term identity keys that sign use keys and can invalidate themselves by signing a new identity key is blockchain?

                                        (i mean sure, there's a chain of keys, but no blocks required)

                                        1 Reply Last reply
                                        0
                                        • trwnh@mastodon.socialT trwnh@mastodon.social

                                          @erincandescent @ikuturso @mcc @jrose i think you could replace it with signed updates but in doing so, you've basically just wrapped around to needing a pki

                                          rakoo@blah.rako.spaceR This user is from outside of this forum
                                          rakoo@blah.rako.spaceR This user is from outside of this forum
                                          rakoo@blah.rako.space
                                          wrote on last edited by
                                          #170
                                          @trwnh

                                          No, the bittorrent DHT has methods to update content sent in the DHT with no need for a PKI: https://bittorrent.org/beps/bep_0049.html

                                          @erincandescent @ikuturso @mcc @jrose
                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups