Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. sure this is all very bad for activitypub but this is truly amazing content

sure this is all very bad for activitypub but this is truly amazing content

Scheduled Pinned Locked Moved Uncategorized
78 Posts 26 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

    @cwebber @promovicz @laurenshof @evan I think one of the problems we’ve had in general is that signing things is a bit of a nightmare. Not just from a non-repudiation perspective (ActivityPub is pretty crap at this - though workable workarounds sort of exist.. - but I doubt ATProto is much better) but from a revocation and propagation of outdated/deleted information perspective.

    Why do we not sign things? Because we don’t have a revocation story and also because indirect relaying gives up all sorts of control. Why is ATProto a bit more flexible here? Because they gave up that control to begin with.

    If the signatures had expiries (which as far as I remember, they don’t!) you could imagine a world where when you click the boost button on my post, you ask my server for a copy of the post that’s signed and carries a short lived signature and then you would relay the post alongside that signature; but then it turns out that one of your followers is on a server that I blocked and now my post is there and, as a general rule, the Fediverse has decided that this is unacceptable (despite being unenforcible in general!), mostly as a consequence of the fact that we don’t have any form of 3rd-party-enforcible reply controls (I wish we had that, maybe it’ll come as an evolution of Mastodon’s quote controls…)

    (And yes, LD Signatures suck, but all signature formats suck in some way or another and signatures are a primitive that it really sucks to build things around. But that’s a whole separate discussion!)

    ridley@hachyderm.ioR This user is from outside of this forum
    ridley@hachyderm.ioR This user is from outside of this forum
    ridley@hachyderm.io
    wrote last edited by
    #48

    @erincandescent

    Can you explain what you mean by expiring signature? Obviously the math doesn’t expire so I assume the idea is signing with some sort of ephemeral key that is not mathematically linked to your identity?

    1 Reply Last reply
    0
    • anders@merveilles.townA anders@merveilles.town

      @cwebber @promovicz @laurenshof @evan I think this whole exchange is a good look, honestly!

      You appear frustrated, about a technical problem that is important to you (one that resonates with me!), you don’t fall back on any weird personal attacks, just get loud.

      Evan takes it in step and responds nicely.

      I could have gasped when i read Evan’s reply and it’s so nice. That’s not how internet exchanges work!

      Anyway, this thread reads like real people having a heated and respectful discussion about stuff they feel strongly about. Well done.

      evan@cosocial.caE This user is from outside of this forum
      evan@cosocial.caE This user is from outside of this forum
      evan@cosocial.ca
      wrote last edited by
      #49

      @anders Thanks, those are nice comments.

      I should also note that I'm not averse to Christine's ideas around using digital signatures for verifying content. They can improve performance by short-circuiting some verification that would require fetching the content over HTTP.

      I do disagree that they are the *only* way to improve that performance, and that it's worth breaking backwards compatibility of the network in order to enable digital signatures.

      @cwebber @promovicz @laurenshof

      cwebber@social.coopC 1 Reply Last reply
      0
      • cwebber@social.coopC cwebber@social.coop

        @promovicz @laurenshof It's "entertaining content" for sure, but what it also gets at is not just the technical side of things, but the social one, and how we are caught between both, and our systems are the output of the conflicts between technical goals and social dynamics.

        @evan is my friend, and I'm not super proud of that exchange, because I lost patience publicly, because this is a sore issue for me. But of course, you tear things back, and Evan and I had a nice chat afterwards, and actually have hung out quite a bit before and since, and behind all of that, both of us were going through things in our personal lives.

        And yet the decisions we make in these messy social dynamics influence the kinds of technical systems which in turn influence the kinds of social systems we can have!

        eeveecraft@dragonscave.spaceE This user is from outside of this forum
        eeveecraft@dragonscave.spaceE This user is from outside of this forum
        eeveecraft@dragonscave.space
        wrote last edited by
        #50

        @cwebber

        Nah, I think you had the right to pop off a bit there. I'm no network engineer, but even I thought verifying upon first read was an insane take. In this age with agentic AI writing goddamn hit-pieces on people and how dangerous things are getting, security has to be a priority. Dis/misinformation is spreading at unprecedented rates, and I think a place like the decentralized web needs to do whatever it can to limit that spread if it wants to actually be a viable alternative/replacement.

        @promovicz @laurenshof @evan

        evan@cosocial.caE 1 Reply Last reply
        0
        • faraiwe@mstdn.socialF faraiwe@mstdn.social

          @thomasfuchs @laurenshof ATProto is the result of corporate minded techbros, to produce yet another #DTBO #SocialMedia aiming at making people a product.

          Thinking ATProto is anything else is deeply naive.

          I'll yake ActivityPub with its *features* of no algorithm tracking me. Every tracker is a bad idea, every collection should be made a liability, so they stop seeing us as meta data cows.

          Long live the #fediverse, free of #bluesky and ALL corporate walled gardens

          esm@wetdry.worldE This user is from outside of this forum
          esm@wetdry.worldE This user is from outside of this forum
          esm@wetdry.world
          wrote last edited by
          #51

          @faraiwe @thomasfuchs @laurenshof i hope you're aware that activitypub is just as public as atproto and that there is nothing stopping someone from creating/running the "tracking algorithms" you claim atproto does by default on this network

          faraiwe@mstdn.socialF esm@wetdry.worldE 2 Replies Last reply
          0
          • esm@wetdry.worldE esm@wetdry.world

            @faraiwe @thomasfuchs @laurenshof i hope you're aware that activitypub is just as public as atproto and that there is nothing stopping someone from creating/running the "tracking algorithms" you claim atproto does by default on this network

            faraiwe@mstdn.socialF This user is from outside of this forum
            faraiwe@mstdn.socialF This user is from outside of this forum
            faraiwe@mstdn.social
            wrote last edited by
            #52

            @esm I hope you are aware that anything shoved down our throats by techbros is to be seen as toxic and harmful, to their exclusive gain, and aligning yourself with their interests is stupid to the point of suicidal.

            Don't let me know.

            1 Reply Last reply
            0
            • evan@cosocial.caE evan@cosocial.ca

              @anders Thanks, those are nice comments.

              I should also note that I'm not averse to Christine's ideas around using digital signatures for verifying content. They can improve performance by short-circuiting some verification that would require fetching the content over HTTP.

              I do disagree that they are the *only* way to improve that performance, and that it's worth breaking backwards compatibility of the network in order to enable digital signatures.

              @cwebber @promovicz @laurenshof

              cwebber@social.coopC This user is from outside of this forum
              cwebber@social.coopC This user is from outside of this forum
              cwebber@social.coop
              wrote last edited by
              #53

              @evan @anders @promovicz @laurenshof It doesn't need to break backwards compatibility tho

              But anyway

              Long conversation potentially

              evan@cosocial.caE 1 Reply Last reply
              0
              • evan@cosocial.caE evan@cosocial.ca

                @laurenshof I didn't think it was that bad at all.

                trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                trishalynn@mastodon.sandwich.net
                wrote last edited by
                #54

                @evan As a newbie to the tech end of decentralized spaces, I’m curious as to why you don’t think it should be “verify, then trust” or other alternatives that don’t allow bad actors to get at people who are not tech-savvy.

                evan@cosocial.caE 1 Reply Last reply
                0
                • esm@wetdry.worldE esm@wetdry.world

                  @faraiwe @thomasfuchs @laurenshof i hope you're aware that activitypub is just as public as atproto and that there is nothing stopping someone from creating/running the "tracking algorithms" you claim atproto does by default on this network

                  esm@wetdry.worldE This user is from outside of this forum
                  esm@wetdry.worldE This user is from outside of this forum
                  esm@wetdry.world
                  wrote last edited by
                  #55

                  apparently i was blocked for saying this, reminder that pointing out that a bad thing that's possible on the "bad" network is also possible on the "good" network is not an endorsement of said bad thing in any way

                  cognitive dissonance and putting your head in the sand are not good strategies to handle potential threats

                  1 Reply Last reply
                  0
                  • trishalynn@mastodon.sandwich.netT trishalynn@mastodon.sandwich.net

                    @evan As a newbie to the tech end of decentralized spaces, I’m curious as to why you don’t think it should be “verify, then trust” or other alternatives that don’t allow bad actors to get at people who are not tech-savvy.

                    evan@cosocial.caE This user is from outside of this forum
                    evan@cosocial.caE This user is from outside of this forum
                    evan@cosocial.ca
                    wrote last edited by
                    #56

                    @trishalynn Sure! So, there are two main events that happen here:

                    - The server receives the third-party data
                    - One of the server's users reads the third-party data

                    There are usually at least a few minutes, and sometimes a few hours or even days between these two events.

                    evan@cosocial.caE 1 Reply Last reply
                    0
                    • evan@cosocial.caE evan@cosocial.ca

                      @trishalynn Sure! So, there are two main events that happen here:

                      - The server receives the third-party data
                      - One of the server's users reads the third-party data

                      There are usually at least a few minutes, and sometimes a few hours or even days between these two events.

                      evan@cosocial.caE This user is from outside of this forum
                      evan@cosocial.caE This user is from outside of this forum
                      evan@cosocial.ca
                      wrote last edited by
                      #57

                      @trishalynn The question is, when should the server *verify* the third-party data?

                      To be conservative, at the very least, the third party data should be verified before one of the server's users reads it.

                      evan@cosocial.caE 1 Reply Last reply
                      0
                      • evan@cosocial.caE evan@cosocial.ca

                        @trishalynn The question is, when should the server *verify* the third-party data?

                        To be conservative, at the very least, the third party data should be verified before one of the server's users reads it.

                        evan@cosocial.caE This user is from outside of this forum
                        evan@cosocial.caE This user is from outside of this forum
                        evan@cosocial.ca
                        wrote last edited by
                        #58

                        @trishalynn If the user is online when the data is received, there may be no time between the time the data is received and when the user reads it.

                        However, most users aren't online most of the time. There's a strong chance that there are minutes, hours, or days between when the data is received and when it is read.

                        trishalynn@mastodon.sandwich.netT evan@cosocial.caE 2 Replies Last reply
                        0
                        • evan@cosocial.caE evan@cosocial.ca

                          @trishalynn If the user is online when the data is received, there may be no time between the time the data is received and when the user reads it.

                          However, most users aren't online most of the time. There's a strong chance that there are minutes, hours, or days between when the data is received and when it is read.

                          trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                          trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                          trishalynn@mastodon.sandwich.net
                          wrote last edited by
                          #59

                          @evan I should think that the server should verify first even if the user is not active online.

                          evan@cosocial.caE 1 Reply Last reply
                          0
                          • evan@cosocial.caE evan@cosocial.ca

                            @trishalynn If the user is online when the data is received, there may be no time between the time the data is received and when the user reads it.

                            However, most users aren't online most of the time. There's a strong chance that there are minutes, hours, or days between when the data is received and when it is read.

                            evan@cosocial.caE This user is from outside of this forum
                            evan@cosocial.caE This user is from outside of this forum
                            evan@cosocial.ca
                            wrote last edited by
                            #60

                            @trishalynn Most ActivityPub implementations today lean waaaaaay into the early part of this gap -- verifying the data as soon as it is received.

                            The problem with this is that sometimes hundreds or even thousands of servers receive the data within a few seconds -- and if they all verify the data with the third-party server immediately, it can swamp that server with requests.

                            evan@cosocial.caE 1 Reply Last reply
                            0
                            • trishalynn@mastodon.sandwich.netT trishalynn@mastodon.sandwich.net

                              @evan I should think that the server should verify first even if the user is not active online.

                              evan@cosocial.caE This user is from outside of this forum
                              evan@cosocial.caE This user is from outside of this forum
                              evan@cosocial.ca
                              wrote last edited by
                              #61

                              @trishalynn Before it's read by a user, yes.

                              1 Reply Last reply
                              0
                              • evan@cosocial.caE evan@cosocial.ca

                                @trishalynn Most ActivityPub implementations today lean waaaaaay into the early part of this gap -- verifying the data as soon as it is received.

                                The problem with this is that sometimes hundreds or even thousands of servers receive the data within a few seconds -- and if they all verify the data with the third-party server immediately, it can swamp that server with requests.

                                evan@cosocial.caE This user is from outside of this forum
                                evan@cosocial.caE This user is from outside of this forum
                                evan@cosocial.ca
                                wrote last edited by
                                #62

                                @trishalynn One way to relieve this pressure on the third party server is to space out all these requests by seconds or even minutes. There are a couple of ways to do this.

                                evan@cosocial.caE 1 Reply Last reply
                                0
                                • evan@cosocial.caE evan@cosocial.ca

                                  @trishalynn One way to relieve this pressure on the third party server is to space out all these requests by seconds or even minutes. There are a couple of ways to do this.

                                  evan@cosocial.caE This user is from outside of this forum
                                  evan@cosocial.caE This user is from outside of this forum
                                  evan@cosocial.ca
                                  wrote last edited by
                                  #63

                                  @trishalynn One is to wait until the first reader reads the data. That event is going to vary wildly across servers, so it will spread out the requests and lower the load on the third-party server. The downside of this technique is that it introduces some extra time for that first read. Usually not a lot, but some.

                                  evan@cosocial.caE trishalynn@mastodon.sandwich.netT 2 Replies Last reply
                                  0
                                  • evan@cosocial.caE evan@cosocial.ca

                                    @trishalynn One is to wait until the first reader reads the data. That event is going to vary wildly across servers, so it will spread out the requests and lower the load on the third-party server. The downside of this technique is that it introduces some extra time for that first read. Usually not a lot, but some.

                                    evan@cosocial.caE This user is from outside of this forum
                                    evan@cosocial.caE This user is from outside of this forum
                                    evan@cosocial.ca
                                    wrote last edited by
                                    #64

                                    @trishalynn Another is for the receiving server to wait a random number of seconds or minutes before doing the verification request. This spaces out the requests, and hopefully avoids the little delay for the user on first read. At worst, if a user tries to read the data before the verification timeout, you can do the verification then -- it's no worse than the previous method, and will usually be better.

                                    evan@cosocial.caE 1 Reply Last reply
                                    0
                                    • evan@cosocial.caE evan@cosocial.ca

                                      @trishalynn One is to wait until the first reader reads the data. That event is going to vary wildly across servers, so it will spread out the requests and lower the load on the third-party server. The downside of this technique is that it introduces some extra time for that first read. Usually not a lot, but some.

                                      trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                                      trishalynn@mastodon.sandwich.netT This user is from outside of this forum
                                      trishalynn@mastodon.sandwich.net
                                      wrote last edited by
                                      #65

                                      @evan (Could you please let me know when you’re done explaining? I don’t want to jump in with clarifying Qs till you’re done.)

                                      evan@cosocial.caE 1 Reply Last reply
                                      0
                                      • evan@cosocial.caE evan@cosocial.ca

                                        @trishalynn Another is for the receiving server to wait a random number of seconds or minutes before doing the verification request. This spaces out the requests, and hopefully avoids the little delay for the user on first read. At worst, if a user tries to read the data before the verification timeout, you can do the verification then -- it's no worse than the previous method, and will usually be better.

                                        evan@cosocial.caE This user is from outside of this forum
                                        evan@cosocial.caE This user is from outside of this forum
                                        evan@cosocial.ca
                                        wrote last edited by
                                        #66

                                        @trishalynn So, the last part, which I think is most controversial, is showing the unverified data to the user -- doing the verification *after* the first read.

                                        This requires a lot of trust between the actors. But if a sending actor has sent 10 or 1000 or 10,000 shares, all of which have previously verified correctly, there's a very good chance that share number 10001 is also going to verify correctly.

                                        evan@cosocial.caE 1 Reply Last reply
                                        0
                                        • evan@cosocial.caE evan@cosocial.ca

                                          @trishalynn So, the last part, which I think is most controversial, is showing the unverified data to the user -- doing the verification *after* the first read.

                                          This requires a lot of trust between the actors. But if a sending actor has sent 10 or 1000 or 10,000 shares, all of which have previously verified correctly, there's a very good chance that share number 10001 is also going to verify correctly.

                                          evan@cosocial.caE This user is from outside of this forum
                                          evan@cosocial.caE This user is from outside of this forum
                                          evan@cosocial.ca
                                          wrote last edited by
                                          #67

                                          @trishalynn This requires a lot more tracking on the receiving server's part. I'm not even sure the performance benefits are that great, compared to waiting for first-read instead of verifying on receipt. But for high-volume servers, it might be a valuable strategy in the future.

                                          trishalynn@mastodon.sandwich.netT 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups