Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Come on, #Fediverse!


Gli ultimi otto messaggi ricevuti dalla Federazione
  • @PortaFed
    @julian
    Why wouldnt the whole export object be signed? If an object is missing, the merkle root wouldnt match and you wouldnt be able to do partial validation anyway. I could have missed something on the strategy there

    read more

  • @jonny @julian You're right on all three points. Updated the spec: destination_did is now optional the backup-before-shutdown case is the primary use case and requiring a destination in advance was a mistake.
    Added Section 5.1 explaining why the Merkle tree exists alongside per-object signatures: the signatures prove per-object authenticity but not completeness. A Merkle root over the full set detects silently dropped objects.
    Added Section 8 explicitly scoping this as an export/import substrate

    read more

  • @jonny@neuromatch.social honestly good for you for investing the time to critique this knowing it's AI (adjacent or wholesale) involvement.

    read more

  • @julian @PortaFed
    giving a further read: I can't really imagine a case where someone would a) regularly be creating signed backups and also b) know in advance where you wanted to migrate to to set the destination_did. Like if this is for the case where the instance has shut down, you might have some signed backup, but you probably haven't planned in advance where you would want to migrate, and if the instance is down you wouldn't be able to create the migration object after the fact.

    the validation strategy for the export is sort of mystifying to me. if the whole object is signed, then why would you need a merkle tree for objects and also an object count? if the contents of the object have changed post signing, then the signature validation will just fail and those are irrelevant.

    true to form for LLM generated documents, several critical things are left undefined, like what last_accepted_sequence is or how that works.

    probably the most important problem is that it's not really clear how all other instances are supposed to handle this, which is the entire hard part of a migration spec. Like, if the purpose here is to preserve identity, then you would need to have all the other instances come to see the new identity as being equivalent to the old identity, and there's no discussion of how that process works for third-party instances at all. like e.g. in FEP-1580 i had to spend a long time gaming out scenarios for how third party instances would handle a move event.

    so without that it's not really an account portabiltiy spec, it's an account export/import spec, which is fine, just not really needed since signing objects and collections (which this spec should use anyway) is already described by other specs.

    read more

  • @silverpillThank you , these are important corrections and I appreciate you taking the time.
    You're right on both points. I'll update the spec to reflect that FEP-ef61 authority is not actor-rooted in the way I described, and that migration is possible via outbox export-import. I was overstating the gap.
    The distinction I was trying to draw is narrower:

    read more

  • @PortaFed

    I have a couple of comments regarding the spec https://codeberg.org/portafed/portafed/src/branch/main/portafed-spec/spec.md

    It contains a comparison with FEP-ef61, but it is not quite correct:

    - FEP-ef61 identity is not actor-rooted. The closest equivalent of FEP-ef61 identity in normal ActivityPub is a server with a domain name. A single FEP-ef61 authority can manage multiple actor documents.
    - FEP-ef61 does not lack a migration flow. Strictly speaking, it doesn't need one, because data is not attached to a server and can be continuously synchronized between multiple servers. But a more familiar migration flow is also possible via outbox export-import.

    @lutindiscret

    read more

  • @benpate That would be great and happy to contribute wherever it fits.
    My guess on the scope decision is the same as yours: hostile-server recovery is genuinely harder, and a cooperative spec is already a lot to get right. Makes sense to tackle it separately.
    Take your time reading. I'll put together a short write-up of how MigrationProof could slot into the existing spec easier to react to something concrete than to an abstract pitch.

    read more

  • @jonny@neuromatch.social tracks doesn't it 😝

    read more
Post suggeriti
  • 0 Votes
    54 Posts
    226 Views
    Got it :smile: [image: 1768321405165-01e5619b-2f1f-4c27-96d6-45ced83b4d42-image.png]
  • #opensuse Leap 16.0 is out!

    Uncategorized opensuse linux homelab
    3
    1
    0 Votes
    3 Posts
    21 Views
    @stefano Running Leap 16 in VirtualBox 7.1 on my Debian laptop. Leap 16 has some problems.First, it only successfully boots every *other* time it powers on. The other times, after the boot loader, it shuts down automatically with no warning.Secondly, there are strange network issues though this may be a Virtual Box thing. I just tried installing Debian 13 and the network config during the installer is continuously failing at DHCP. I'm on public wifi at a hospital, but that shouldn't matter because the laptop itself and my phone connect to the wifi no problems. I suspect I have some troubleshooting to do there....but only being able to successfully power up every other time? Yeah, that is strange.
  • 0 Votes
    1 Posts
    13 Views
    The pizza was good and now it's time to go to bed. Ready for a new week. Ready for a new Monday.Goodnight, #FediverseGoodnight, world!
  • 0 Votes
    1 Posts
    12 Views
    Experimental support for multiple users landed with Ktistec release v2.4.15. "Experimental" means that it works for me, but hasn't seen enough testing for me to call it "ready for production". With that said, it's unlikely you'll lose your data.There are lots of intentional design decisions that fit my vision for Ktistec but may surprise you. Here they are:Every user is an administrator. That doesn't mean users have access to each other's posts and data, but it does mean all users have access to the shared parts of the site—they can change the site description, for example—and they can add new users. So only add people you trust.If you want to add another user, create an account for them and give them their username and password.  There is no self-registration. There are no invitations.Beyond adding a user, there is no support for user management. You can't even boot a user from your site. Users can delete themselves, however.There is no support for content moderation. Only add people you trust.TL;DR Multi-user support in Ktistec is suitable for small teams, families (biological or chosen), and your personal avatars. There are better tools for online communities.Here's the full set of changes:AddedAdd support for multiple user accounts.FixedHide attachments behind the summary. (fixes #125)Mark actors as up after refreshing their profile.#ktistec #fediverse #activitypub #crystallang