Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

FR#150 – On ICE, Verification, and Presence As Harm

Uncategorized
3 3 0
  • FR#150 – On ICE, Verification, and Presence As Harm

    The U.S. Immigration and Customs Enforcement, ICE, became one of the most-blocked accounts on Bluesky within days of receiving its verification badge handed out by Bluesky PBC. The account itself has not posted anything, because it does not need to, with the presence being the point. ICE joining Bluesky was part of a moment in November 2025 where the US regime decided to antagonize the ATProto network by having multiple organisations, including the White House, join the network. They quickly lost interest again however, and most accounts have not posted anything over the last two months.

    The decision by Bluesky PBC to verify the ICE account, two months after registration and without the account being active, lead to quite different responses for the fediverse and for the ATmosphere. On the fediverse, the choice by Bluesky PBC to lend legitimacy to ICE was a final nail in the coffin, with loud declarations to disconnect from Bluesky and block the bridge between these two networking protocols. Mastodon founder Eugen Rochko was the most notable account, who publicly declared to disconnect from the bridge.

    Within the ATmosphere, the response focused on two parts, both a frustration with Bluesky PBC verifying the ICE account, as well as a call to block the account en-masse, which led to the ICE account quickly becoming one of the most-blocked accounts on the network.

    The difference in response between the networks provide an insight in how both the ActivityPub network and the AT Protocol network have very different underlying assumptions, where these obscure difference in network architecture lead to diverging outcomes in social structure and behaviour.

    In the ActivityPub model, servers are understood as opinionated communities or places, that choose to connect with other communities. Federation is optional and based on a match in values between the connecting servers. This value-question is baked into it’s network structure, and makes it clear that every individual server is a non-neutral place.

    (As a side-note, the fediverse as-it-exists struggles with this model, with Mastodon being uncomfortably stuck between the marketing material promoting a network-of-communities with shared values, but the software having a deeply ingrained mental model of ‘lets-federate-with-everyone’, which in itself explains a fair amount of conflict in the fediverse over the years).

    ATProto takes a different approach, by separating the base layer of data storage from the application layer. The base data storage layer is designed to be neutral infrastructure, where data lives in Personal Data Servers. This data is ‘neutral’, in the sense that it is permisionless and anyone can set up a PDS without permission. The applications built on top of that infrastructure are assumed to be opinionated and not neutral. Every ATProto application takes a subset of the entire network of data, and can be opinionated about what they surface and to whom they present this.

    This creates a sense of ‘neutrality’ at the base layer (hello to all the people whose eyes start twitching every time they read the claim that social software can ever be neutral), with value-based and opinionated apps build on top of this base layer.

    When fediverse users say they don’t want to be bridged to Bluesky, they’re applying an ActivityPub mental model to ATProto infrastructure. In one sense this is a bit of a category error, the bridge connects to networking infrastructure, not the application. This way your’e not just refusing to federate with the Bluesky-the-app but with the entire ecosystem, including apps with different values, such as Blacksky or Leaflet.

    But in another sense, this shows the issue with bridging between these two networks, and how this is not just a matter of networking architecture, but of how network architecture leads to different mental models that are not always compatible with each other.

    The choice by Bluesky PBC to give ICE a verification checkmark shows that while the company has built systems that enable the ‘neutral infra, opinionated apps’ model, their operational choices fall back to a 2010s mental model where the platform itself is the neutral ground, where everyone, including Trump, is welcome.

    Bluesky’s Community Guidelines lists the two major principles as ‘Safety First’ and ‘Respect Others’. It is somewhat unclear how the presence of a fascist police force that is actively working to instigate civil war aligns with the principles of safety and respect that Bluesky supposedly champions.

    When it comes to actual rules in the guidelines, it is all about user behaviour and the content on Bluesky. The problem is that it is the presence of ICE itself that is already causing the harm. The intimidation of ‘we are here, you cannot escape us’ is the point, and the accounts by the regime are deliberately trying to provoke an outrage. The account doesn’t need to post anything that violates the rules because the intimidation is the presence itself. Bluesky’s Community Guidelines emerged from a moderation paradigm that moderates content (its called content moderation for a reason), and has a structural blind spot for presence-as-speech. Fascists intuitively understand this difference, and are skilled at exploiting it.

    The problem is that there is no easy fix for this either. Bluesky board member Mike Masnick formulated this as Masnick’s Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well. And if content moderation on a platform is already impossible to do well at scale, it is even more impossible to do well at scale when off-platform behaviour were to be considered. Which makes it understandable why a Trust & Safety team would not want to consider off-platform behaviour when enforcing rules.

    But Bluesky’s own open protocol makes this all the more difficult the further the network grows. If a fascist publishes a nazi blog under the standard.site lexicon on their own self-hosted PDS, should Bluesky PBC let this account use their Bluesky app? According to the current Community Guidelines the answer is yes: “These Guidelines only apply to social networking that happens on Bluesky. If you’re using another social networking application on the AT Protocol that isn’t Bluesky Social (a “Developer Application”), the terms and conditions of that Developer Application will govern your experience. We are not responsible for the content or practices of Developer Applications.”

    The fundamental problem is that the way Bluesky is set up, both the company and the app, it is virtually impossible to do moderation that takes off-platform behaviour into account. But if you don’t take off-platform behaviour into account, your principles in the Community Guidelines of Safety and Respect lose their meaning.

    The second issue here is that not only let Bluesky have ICE have an account, but that they felt the need to verify this account, after the account had been dormant for a while. Verifications via checkmarks are ostensibly to prevent against misinformation and impersonation, but in practice their main use case is to signal social status, endorsed by the verifier.

    Bluesky’s verification system was explicitly designed to distribute trust rather than concentrate it. When launching the system in April 2025, the company wrote that trust “emerges from relationships, communities, and shared context,” not just top-down from platforms. The Trusted Verifiers feature allows independent organizations to issue verification badges directly.

    This design of the verification system is a good example of the infrastructure/application separation of ATProto, where verification doesn’t have to be a network-wide decision made by Bluesky PBC. Instead the system allows for multiple verification sources with different values and criteria, letting users decide which verifiers they trust.

    For government accounts, Bluesky had options. They could have delegated verification to a news organization, a government accountability group, or some other entity willing to take on that role. They could have let ICE exist as an unverified account, authenticated only by its domain handle. Instead, after nearly two months of apparent deliberation, Bluesky PBC verified ICE directly.

    Bluesky PBC built a system designed precisely for moments like this, where verification decisions could be distributed and delegated to other actors, rather than centralized. And then, the first time it could have meaningfully applied that distinction, the company defaulted to acting like the platform that decides who gets legitimacy, where they themselves wanted to be the ones that verified ICE.

    Let’s be clear here: ICE is conducting a reign of terror, committing excessive violence and murder, with the blessing of the state for its officers to not be bound to the law, with the explicit purpose of baiting people into committing violent responses and stoke the flames and possibility of civil war. The very presence of ICE is to cause terror.

    And if your social networking guidelines say “sorry we can’t do anything about this”, something has gone pretty wrong somewhere, in a way that goes beyond just this individual decision itself.

    So when fediverse people apply an ActivityPub-style mental model of networked communities to an ATProto model that separates infrastructure from application, how wrong exactly is that, when the company that has built the tools for that distinction does not operate according to them when the pressure is on?

    The case of ICE shows two unresolved problems that will only intensify as the ecosystem grows: how to deal with abusive behaviour that happens outside of the app (and especially if it happens outside of the app but on-protocol) but causes harm on it, and how in a world where fascism is a real and existential threat, harms on social networks have evolved from not only being content-based but also being presence-based.


    https://connectedplaces.online/reports/fr150-on-ice-verification-and-presence-as-harm/

  • FR#150 – On ICE, Verification, and Presence As Harm

    The U.S. Immigration and Customs Enforcement, ICE, became one of the most-blocked accounts on Bluesky within days of receiving its verification badge handed out by Bluesky PBC. The account itself has not posted anything, because it does not need to, with the presence being the point. ICE joining Bluesky was part of a moment in November 2025 where the US regime decided to antagonize the ATProto network by having multiple organisations, including the White House, join the network. They quickly lost interest again however, and most accounts have not posted anything over the last two months.

    The decision by Bluesky PBC to verify the ICE account, two months after registration and without the account being active, lead to quite different responses for the fediverse and for the ATmosphere. On the fediverse, the choice by Bluesky PBC to lend legitimacy to ICE was a final nail in the coffin, with loud declarations to disconnect from Bluesky and block the bridge between these two networking protocols. Mastodon founder Eugen Rochko was the most notable account, who publicly declared to disconnect from the bridge.

    Within the ATmosphere, the response focused on two parts, both a frustration with Bluesky PBC verifying the ICE account, as well as a call to block the account en-masse, which led to the ICE account quickly becoming one of the most-blocked accounts on the network.

    The difference in response between the networks provide an insight in how both the ActivityPub network and the AT Protocol network have very different underlying assumptions, where these obscure difference in network architecture lead to diverging outcomes in social structure and behaviour.

    In the ActivityPub model, servers are understood as opinionated communities or places, that choose to connect with other communities. Federation is optional and based on a match in values between the connecting servers. This value-question is baked into it’s network structure, and makes it clear that every individual server is a non-neutral place.

    (As a side-note, the fediverse as-it-exists struggles with this model, with Mastodon being uncomfortably stuck between the marketing material promoting a network-of-communities with shared values, but the software having a deeply ingrained mental model of ‘lets-federate-with-everyone’, which in itself explains a fair amount of conflict in the fediverse over the years).

    ATProto takes a different approach, by separating the base layer of data storage from the application layer. The base data storage layer is designed to be neutral infrastructure, where data lives in Personal Data Servers. This data is ‘neutral’, in the sense that it is permisionless and anyone can set up a PDS without permission. The applications built on top of that infrastructure are assumed to be opinionated and not neutral. Every ATProto application takes a subset of the entire network of data, and can be opinionated about what they surface and to whom they present this.

    This creates a sense of ‘neutrality’ at the base layer (hello to all the people whose eyes start twitching every time they read the claim that social software can ever be neutral), with value-based and opinionated apps build on top of this base layer.

    When fediverse users say they don’t want to be bridged to Bluesky, they’re applying an ActivityPub mental model to ATProto infrastructure. In one sense this is a bit of a category error, the bridge connects to networking infrastructure, not the application. This way your’e not just refusing to federate with the Bluesky-the-app but with the entire ecosystem, including apps with different values, such as Blacksky or Leaflet.

    But in another sense, this shows the issue with bridging between these two networks, and how this is not just a matter of networking architecture, but of how network architecture leads to different mental models that are not always compatible with each other.

    The choice by Bluesky PBC to give ICE a verification checkmark shows that while the company has built systems that enable the ‘neutral infra, opinionated apps’ model, their operational choices fall back to a 2010s mental model where the platform itself is the neutral ground, where everyone, including Trump, is welcome.

    Bluesky’s Community Guidelines lists the two major principles as ‘Safety First’ and ‘Respect Others’. It is somewhat unclear how the presence of a fascist police force that is actively working to instigate civil war aligns with the principles of safety and respect that Bluesky supposedly champions.

    When it comes to actual rules in the guidelines, it is all about user behaviour and the content on Bluesky. The problem is that it is the presence of ICE itself that is already causing the harm. The intimidation of ‘we are here, you cannot escape us’ is the point, and the accounts by the regime are deliberately trying to provoke an outrage. The account doesn’t need to post anything that violates the rules because the intimidation is the presence itself. Bluesky’s Community Guidelines emerged from a moderation paradigm that moderates content (its called content moderation for a reason), and has a structural blind spot for presence-as-speech. Fascists intuitively understand this difference, and are skilled at exploiting it.

    The problem is that there is no easy fix for this either. Bluesky board member Mike Masnick formulated this as Masnick’s Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well. And if content moderation on a platform is already impossible to do well at scale, it is even more impossible to do well at scale when off-platform behaviour were to be considered. Which makes it understandable why a Trust & Safety team would not want to consider off-platform behaviour when enforcing rules.

    But Bluesky’s own open protocol makes this all the more difficult the further the network grows. If a fascist publishes a nazi blog under the standard.site lexicon on their own self-hosted PDS, should Bluesky PBC let this account use their Bluesky app? According to the current Community Guidelines the answer is yes: “These Guidelines only apply to social networking that happens on Bluesky. If you’re using another social networking application on the AT Protocol that isn’t Bluesky Social (a “Developer Application”), the terms and conditions of that Developer Application will govern your experience. We are not responsible for the content or practices of Developer Applications.”

    The fundamental problem is that the way Bluesky is set up, both the company and the app, it is virtually impossible to do moderation that takes off-platform behaviour into account. But if you don’t take off-platform behaviour into account, your principles in the Community Guidelines of Safety and Respect lose their meaning.

    The second issue here is that not only let Bluesky have ICE have an account, but that they felt the need to verify this account, after the account had been dormant for a while. Verifications via checkmarks are ostensibly to prevent against misinformation and impersonation, but in practice their main use case is to signal social status, endorsed by the verifier.

    Bluesky’s verification system was explicitly designed to distribute trust rather than concentrate it. When launching the system in April 2025, the company wrote that trust “emerges from relationships, communities, and shared context,” not just top-down from platforms. The Trusted Verifiers feature allows independent organizations to issue verification badges directly.

    This design of the verification system is a good example of the infrastructure/application separation of ATProto, where verification doesn’t have to be a network-wide decision made by Bluesky PBC. Instead the system allows for multiple verification sources with different values and criteria, letting users decide which verifiers they trust.

    For government accounts, Bluesky had options. They could have delegated verification to a news organization, a government accountability group, or some other entity willing to take on that role. They could have let ICE exist as an unverified account, authenticated only by its domain handle. Instead, after nearly two months of apparent deliberation, Bluesky PBC verified ICE directly.

    Bluesky PBC built a system designed precisely for moments like this, where verification decisions could be distributed and delegated to other actors, rather than centralized. And then, the first time it could have meaningfully applied that distinction, the company defaulted to acting like the platform that decides who gets legitimacy, where they themselves wanted to be the ones that verified ICE.

    Let’s be clear here: ICE is conducting a reign of terror, committing excessive violence and murder, with the blessing of the state for its officers to not be bound to the law, with the explicit purpose of baiting people into committing violent responses and stoke the flames and possibility of civil war. The very presence of ICE is to cause terror.

    And if your social networking guidelines say “sorry we can’t do anything about this”, something has gone pretty wrong somewhere, in a way that goes beyond just this individual decision itself.

    So when fediverse people apply an ActivityPub-style mental model of networked communities to an ATProto model that separates infrastructure from application, how wrong exactly is that, when the company that has built the tools for that distinction does not operate according to them when the pressure is on?

    The case of ICE shows two unresolved problems that will only intensify as the ecosystem grows: how to deal with abusive behaviour that happens outside of the app (and especially if it happens outside of the app but on-protocol) but causes harm on it, and how in a world where fascism is a real and existential threat, harms on social networks have evolved from not only being content-based but also being presence-based.


    https://connectedplaces.online/reports/fr150-on-ice-verification-and-presence-as-harm/

    @laurenshof great analysis, Laurens!

  • FR#150 – On ICE, Verification, and Presence As Harm

    The U.S. Immigration and Customs Enforcement, ICE, became one of the most-blocked accounts on Bluesky within days of receiving its verification badge handed out by Bluesky PBC. The account itself has not posted anything, because it does not need to, with the presence being the point. ICE joining Bluesky was part of a moment in November 2025 where the US regime decided to antagonize the ATProto network by having multiple organisations, including the White House, join the network. They quickly lost interest again however, and most accounts have not posted anything over the last two months.

    The decision by Bluesky PBC to verify the ICE account, two months after registration and without the account being active, lead to quite different responses for the fediverse and for the ATmosphere. On the fediverse, the choice by Bluesky PBC to lend legitimacy to ICE was a final nail in the coffin, with loud declarations to disconnect from Bluesky and block the bridge between these two networking protocols. Mastodon founder Eugen Rochko was the most notable account, who publicly declared to disconnect from the bridge.

    Within the ATmosphere, the response focused on two parts, both a frustration with Bluesky PBC verifying the ICE account, as well as a call to block the account en-masse, which led to the ICE account quickly becoming one of the most-blocked accounts on the network.

    The difference in response between the networks provide an insight in how both the ActivityPub network and the AT Protocol network have very different underlying assumptions, where these obscure difference in network architecture lead to diverging outcomes in social structure and behaviour.

    In the ActivityPub model, servers are understood as opinionated communities or places, that choose to connect with other communities. Federation is optional and based on a match in values between the connecting servers. This value-question is baked into it’s network structure, and makes it clear that every individual server is a non-neutral place.

    (As a side-note, the fediverse as-it-exists struggles with this model, with Mastodon being uncomfortably stuck between the marketing material promoting a network-of-communities with shared values, but the software having a deeply ingrained mental model of ‘lets-federate-with-everyone’, which in itself explains a fair amount of conflict in the fediverse over the years).

    ATProto takes a different approach, by separating the base layer of data storage from the application layer. The base data storage layer is designed to be neutral infrastructure, where data lives in Personal Data Servers. This data is ‘neutral’, in the sense that it is permisionless and anyone can set up a PDS without permission. The applications built on top of that infrastructure are assumed to be opinionated and not neutral. Every ATProto application takes a subset of the entire network of data, and can be opinionated about what they surface and to whom they present this.

    This creates a sense of ‘neutrality’ at the base layer (hello to all the people whose eyes start twitching every time they read the claim that social software can ever be neutral), with value-based and opinionated apps build on top of this base layer.

    When fediverse users say they don’t want to be bridged to Bluesky, they’re applying an ActivityPub mental model to ATProto infrastructure. In one sense this is a bit of a category error, the bridge connects to networking infrastructure, not the application. This way your’e not just refusing to federate with the Bluesky-the-app but with the entire ecosystem, including apps with different values, such as Blacksky or Leaflet.

    But in another sense, this shows the issue with bridging between these two networks, and how this is not just a matter of networking architecture, but of how network architecture leads to different mental models that are not always compatible with each other.

    The choice by Bluesky PBC to give ICE a verification checkmark shows that while the company has built systems that enable the ‘neutral infra, opinionated apps’ model, their operational choices fall back to a 2010s mental model where the platform itself is the neutral ground, where everyone, including Trump, is welcome.

    Bluesky’s Community Guidelines lists the two major principles as ‘Safety First’ and ‘Respect Others’. It is somewhat unclear how the presence of a fascist police force that is actively working to instigate civil war aligns with the principles of safety and respect that Bluesky supposedly champions.

    When it comes to actual rules in the guidelines, it is all about user behaviour and the content on Bluesky. The problem is that it is the presence of ICE itself that is already causing the harm. The intimidation of ‘we are here, you cannot escape us’ is the point, and the accounts by the regime are deliberately trying to provoke an outrage. The account doesn’t need to post anything that violates the rules because the intimidation is the presence itself. Bluesky’s Community Guidelines emerged from a moderation paradigm that moderates content (its called content moderation for a reason), and has a structural blind spot for presence-as-speech. Fascists intuitively understand this difference, and are skilled at exploiting it.

    The problem is that there is no easy fix for this either. Bluesky board member Mike Masnick formulated this as Masnick’s Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well. And if content moderation on a platform is already impossible to do well at scale, it is even more impossible to do well at scale when off-platform behaviour were to be considered. Which makes it understandable why a Trust & Safety team would not want to consider off-platform behaviour when enforcing rules.

    But Bluesky’s own open protocol makes this all the more difficult the further the network grows. If a fascist publishes a nazi blog under the standard.site lexicon on their own self-hosted PDS, should Bluesky PBC let this account use their Bluesky app? According to the current Community Guidelines the answer is yes: “These Guidelines only apply to social networking that happens on Bluesky. If you’re using another social networking application on the AT Protocol that isn’t Bluesky Social (a “Developer Application”), the terms and conditions of that Developer Application will govern your experience. We are not responsible for the content or practices of Developer Applications.”

    The fundamental problem is that the way Bluesky is set up, both the company and the app, it is virtually impossible to do moderation that takes off-platform behaviour into account. But if you don’t take off-platform behaviour into account, your principles in the Community Guidelines of Safety and Respect lose their meaning.

    The second issue here is that not only let Bluesky have ICE have an account, but that they felt the need to verify this account, after the account had been dormant for a while. Verifications via checkmarks are ostensibly to prevent against misinformation and impersonation, but in practice their main use case is to signal social status, endorsed by the verifier.

    Bluesky’s verification system was explicitly designed to distribute trust rather than concentrate it. When launching the system in April 2025, the company wrote that trust “emerges from relationships, communities, and shared context,” not just top-down from platforms. The Trusted Verifiers feature allows independent organizations to issue verification badges directly.

    This design of the verification system is a good example of the infrastructure/application separation of ATProto, where verification doesn’t have to be a network-wide decision made by Bluesky PBC. Instead the system allows for multiple verification sources with different values and criteria, letting users decide which verifiers they trust.

    For government accounts, Bluesky had options. They could have delegated verification to a news organization, a government accountability group, or some other entity willing to take on that role. They could have let ICE exist as an unverified account, authenticated only by its domain handle. Instead, after nearly two months of apparent deliberation, Bluesky PBC verified ICE directly.

    Bluesky PBC built a system designed precisely for moments like this, where verification decisions could be distributed and delegated to other actors, rather than centralized. And then, the first time it could have meaningfully applied that distinction, the company defaulted to acting like the platform that decides who gets legitimacy, where they themselves wanted to be the ones that verified ICE.

    Let’s be clear here: ICE is conducting a reign of terror, committing excessive violence and murder, with the blessing of the state for its officers to not be bound to the law, with the explicit purpose of baiting people into committing violent responses and stoke the flames and possibility of civil war. The very presence of ICE is to cause terror.

    And if your social networking guidelines say “sorry we can’t do anything about this”, something has gone pretty wrong somewhere, in a way that goes beyond just this individual decision itself.

    So when fediverse people apply an ActivityPub-style mental model of networked communities to an ATProto model that separates infrastructure from application, how wrong exactly is that, when the company that has built the tools for that distinction does not operate according to them when the pressure is on?

    The case of ICE shows two unresolved problems that will only intensify as the ecosystem grows: how to deal with abusive behaviour that happens outside of the app (and especially if it happens outside of the app but on-protocol) but causes harm on it, and how in a world where fascism is a real and existential threat, harms on social networks have evolved from not only being content-based but also being presence-based.


    https://connectedplaces.online/reports/fr150-on-ice-verification-and-presence-as-harm/

    @laurenshof

    Reposting my own comment from over on Bluesky:

    I want to draw out something that is somewhat in your post, but that I think is worth making explicit: what this incident demonstrates is that Bluesky PBC is *platform first*, *protocol second*. They had several options that could have taken advantage of the protocol, and ignored all of them.

  • oblomov@sociale.networkundefined oblomov@sociale.network shared this topic on

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    1 Posts
    0 Views
    Fediverse Report – #149 – On Protocol Governance The W3C has announced a new Social Web Working Group, starting January 15, 2026, to maintain and update the ActivityPub protoocol. The group will be chaired by Darius Kazemi, who created Hometown Mastodon fork and the Fediverse Schema Observatory. The aim of the Working Group is to release updates to ActivityPub, and its specifications such as Activity Streams and Activity Vocabulary. Most of the work on the protocol is scheduled to be done by Q3 2026, with the Working Group running until January 2028.To understand why this matters, some context on how the W3C operates is necessary. The standards organisation distinguishes between Community Groups and Working Groups. Community Groups are open to anyone and serve as incubation spaces for ideas. Since 2018, the Social Web Incubator Community Group (SocialCG) has been the steward of ActivityPub. While Community Groups serve as a grass-roots place, they are very limited in publishing official documentations and formal updates to protocol standards. Working Groups, by contrast, are the bodies that can actually publish official W3C Recommendations, meaning formal standards. Participation in Working Groups is restricted to representatives of W3C member organisations (which pay membership fees on a sliding scale) and invited experts approved by the chair.ActivityPub became a W3C Recommendation in January 2018, and the protocol work was done by a Working Group. After ActivityPub became an official W3C specification, this Working Group disbanded, and the SocialCG was formed. Since then, the specification has not been formally updated, despite significant implementation experience revealing ambiguities and missing features. The SocialCG has maintained an errata document and developed extensions through the Fediverse Enhancement Proposal process, but these carry no official W3C status. The new Working Group changes this by providing a formal path to update the core specification.Fediverse advocates regularly point to ActivityPub being a W3C standard as a mark of legitimacy, but for the past seven years the organisational structure that created the protocol has also prevented necessary updates to it. The W3C has done a massive service to the community by holding space for the creation of the protocol in 2018. But since then, the same organisational structure that allowed the protocol to be created also slowed down necessary further work on ActivityPub. This shows up both in errata documents not becoming part of the formal documentation, but also larger work on the Client-To-Server part of the ActivityPub needing more work in order to be suitable for larger adoption. The new Working Group for ActivityPub changes this situation, and there now a formal path to update the core specification, incorporate errata, and potentially advance new work like LOLA (Live Online Account Portability) to official status. LOLA is a proposal for server-to-server account migration that would allow users to move between ActivityPub servers while retaining both their posts and their social graph. Unlike the current Move activity that only migrates followers, LOLA would enable full content portability. The charter includes LOLA as a potential deliverable, which means it could become an official W3C specification rather than remaining a community proposal.The are some major complicating factor however, and that is about who actually gets to make decisions. The Community Group lacked power to make official chances to ActivityPub, but it did provide an open place for anyone to participate. In contrast, the Working Group requires participants to either be a paid W3C member or to be an Invited Expert. There are only two organisations that are active in the fediverse that are a paid member of the W3C: Meta and the Social Web Foundation. With the Social Web Foundation also receiving funding from Meta, the company that built Threads now has more institutional standing in ActivityPub governance than any of the organisations actually building open fediverse software. Mastodon gGmbH, Framasoft, and others are not W3C members and cannot participate in the Working Group unless they are invited.This is by all accounts an extremely funny outcome for a network that aims to be independent of Big Tech’s power.A few nuances to this. It is unclear if Meta will actually participate in the Working Group, and considering they recently put their Threads<>fediverse integration on maintenance mode, there is a good change that Meta has no interest in actually participating. The Working Group also has yet to communicate who the Invited Experts will be. It could theoretically be that Meta is absent from the group, while Mastodon and Framasoft employees are invited to be part of the Working Group. Another challenge for the W3C Working Group is that there has long been a disconnect between ActivityPub protocol development and the people creating ActivityPub software. While the above makes it sound that fediverse developers are excluded from the protocol development process, the practical reality is also that the developers of the main fediverse platforms like Mastodon, PeerTube and Lemmy have shown very little interest in engaging with the process when it was openly accessible under the SocialCG. This is illustrated by the meeting last year in which the SocialCG voted to charter a Working Group, where no member of any of the fediverse platform developers was actually present. There has long been a disconnect between the people who develop ActivityPub software and the people who maintain the ActivityPub protocol, with only a few notable exceptions.This matters because of how W3C standards work. The charter’s success criteria states that updating the Recommendation requires “at least two independent implementations of every feature defined in the specification, where interoperability can be verified by passing open test suites.” The Working Group can propose whatever changes it wants, but for those proposals to become part of the official ActivityPub standard, they need to be implemented in actual software.LOLA, the proposal to improve account portability, is a clear example of this challenge. Already in fall 2024, Lisa Dusseault, the author of the proposal, said that the specification was ready for developers to start testing implementations. The main bottleneck since then has been getting organisations like Mastodon interested in actually building it. The protocol work is largely done, but what remains is the persuasion and coordination to get implementers interested in using it.The importance of protocol maintenance and further development of ActivityPub points towards responsibilities for software implementors, especially Mastodon as the dominant ActivityPub implementation. Mastodon’s choices become de facto standards whether or not the project engages with formal standardisation processes. The most clear example is how the Mastodon API has effectively taken over from ActivityPub’s Client-to-Server as the dominant protocol that other softwares have to implement. That position comes with obligations, and when Mastodon doesn’t participate in protocol governance, it creates a vacuum where the largest implementer (in this case also Mastodon) is able to set standards for the rest of the network, but without the governance or formal documentation. When protocol development and maintenance in the Working Group happens disconnected from the largest implementations, the specifications that may not reflect implementation realities.What this situation reveals is that using network architecture to solve issues of power distribution simply shifts bottlenecks rather than eliminating them. A decentralised protocol does not automatically produce decentralised governance, it also moves power to different, less visible places. The W3C membership structure concentrates formal power in ways that don’t reflect the fediverse’s values, while the implementers who could counterbalance that power have largely opted out of the process. The new Working Group creates an opportunity to address both problems, but who gets to shape the specifications of ActivityPub depends on both who is allowed to participate, as well as who is willing show up and do the work. #nlnet https://connectedplaces.online/reports/fediverse-report-148-on-protocol-governance/
  • 1 Votes
    2 Posts
    14 Views
    @mariusor I agree that finding those last percents of coverage can be a pain.But yes, more so trying to get a full app coverage up is hard and unsatisfactory work.
  • 0 Votes
    1 Posts
    5 Views
    Sciety is bridging preprints and open social networks. Our latest integration with @bonfire enables you to start a discussion on Sciety and federate anywhere; meeting researchers wherever they already are. https://blog.sciety.org/bridging-preprints-and-the-fediverse/#Fediverse #ActivityPub #NLnet
  • 0 Votes
    4 Posts
    27 Views
    @Harald Eilertsen Hurra!