-
Spyware: gli USA rimuovono le sanzioni agli sviluppatori dello spyware Predator
Watching Ignoring Scheduled Pinned Locked Moved News redhotcyber news intellexa predator spyware sanzioni dipartimentodeltesoro statiuniti
1
0 Votes1 Posts8 Views -
A tutta sorveglianza: Predator torna più potente che mai grazie a nuove vulnerabilità zero-day
Watching Ignoring Scheduled Pinned Locked Moved News redhotcyber news cybersecurity hacking malware ransomware spyware intellexa
1
0 Votes1 Posts8 Views
Gli ultimi otto messaggi ricevuti dalla Federazione
-
@julian @PortaFed
giving a further read: I can't really imagine a case where someone would a) regularly be creating signed backups and also b) know in advance where you wanted to migrate to to set the destination_did. Like if this is for the case where the instance has shut down, you might have some signed backup, but you probably haven't planned in advance where you would want to migrate, and if the instance is down you wouldn't be able to create the migration object after the fact.the validation strategy for the export is sort of mystifying to me. if the whole object is signed, then why would you need a merkle tree for objects and also an object count? if the contents of the object have changed post signing, then the signature validation will just fail and those are irrelevant.
true to form for LLM generated documents, several critical things are left undefined, like what last_accepted_sequence is or how that works.
probably the most important problem is that it's not really clear how all other instances are supposed to handle this, which is the entire hard part of a migration spec. Like, if the purpose here is to preserve identity, then you would need to have all the other instances come to see the new identity as being equivalent to the old identity, and there's no discussion of how that process works for third-party instances at all. like e.g. in FEP-1580 i had to spend a long time gaming out scenarios for how third party instances would handle a move event.
so without that it's not really an account portabiltiy spec, it's an account export/import spec, which is fine, just not really needed since signing objects and collections (which this spec should use anyway) is already described by other specs.
-
I have a couple of comments regarding the spec https://codeberg.org/portafed/portafed/src/branch/main/portafed-spec/spec.md
It contains a comparison with FEP-ef61, but it is not quite correct:
- FEP-ef61 identity is not actor-rooted. The closest equivalent of FEP-ef61 identity in normal ActivityPub is a server with a domain name. A single FEP-ef61 authority can manage multiple actor documents.
- FEP-ef61 does not lack a migration flow. Strictly speaking, it doesn't need one, because data is not attached to a server and can be continuously synchronized between multiple servers. But a more familiar migration flow is also possible via outbox export-import.
-
@benpate That would be great and happy to contribute wherever it fits.
My guess on the scope decision is the same as yours: hostile-server recovery is genuinely harder, and a cooperative spec is already a lot to get right. Makes sense to tackle it separately.
Take your time reading. I'll put together a short write-up of how MigrationProof could slot into the existing spec easier to react to something concrete than to an abstract pitch.
-
@jonny@neuromatch.social tracks doesn't it 😝
-
-
Warm up the fire! We're LIVE!
Summer in Winter: Norcal Gma 2's Journey with her Dog - E79
#owncast #streaming #interview #fediverse #fedi #people #show #firesidefedi #FsF
-
@PortaFed That's awesome. Let's work you into the existing effort. We could use all the help we can get.
Also: I'm pretty new to the data portability spec; so I know that "hostile server" is out of scope, but I wasn't there to know why that choice was made. I'm *guessing* is was too much to tackle at the time.
But one way or another, it would be great to have something in place for this situation, too.
I still need to read your work fully, so I understand what we're talking about :)
-
@benpate Yes, that’s exactly the gap I’m aiming at: the case where the old server is gone, hostile, or unavailable, and the user needs some way to carry forward verifiable account state without relying on that server’s cooperation.
My reading is that LOLA covers the cooperative portability path well, while this harsher failure case still needs more work. I don’t see PortaFed as a competing standard so much as a possible building block for that scenario.
Post suggeriti
-
Introducing PortaFed — cryptographic account portability for #ActivityPub
Watching Ignoring Scheduled Pinned Locked Moved Fediverso activitypub fediverse0 Votes14 Posts12 Views -
Warm up the fire!
Watching Ignoring Scheduled Pinned Locked Moved Fediverso owncast streaming interview fediverse fedi people show firesidefedi0 Votes1 Posts0 Views -
OpenAI lancia Codex Security: 10.561 bug di sicurezza scoperti in 30 giorni
Watching Ignoring Scheduled Pinned Locked Moved News redhotcyber news cybersecurity intelligenzaartificial sicurezzainformatica devsecops sviluppatore
1
0 Votes1 Posts1 Views -
I Droni colpiscono il cloud!
Watching Ignoring Scheduled Pinned Locked Moved News redhotcyber news cybersecurity cloudcomputing datacenter vulnerabilita infrastrutturecritiche
1
0 Votes1 Posts1 Views