Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Introducing PortaFed — cryptographic account portability for #ActivityPub

Fediverso
18 7 16

Gli ultimi otto messaggi ricevuti dalla Federazione
  • @PortaFed
    @julian
    Why wouldnt the whole export object be signed? If an object is missing, the merkle root wouldnt match and you wouldnt be able to do partial validation anyway. I could have missed something on the strategy there

    read more

  • @jonny @julian You're right on all three points. Updated the spec: destination_did is now optional the backup-before-shutdown case is the primary use case and requiring a destination in advance was a mistake.
    Added Section 5.1 explaining why the Merkle tree exists alongside per-object signatures: the signatures prove per-object authenticity but not completeness. A Merkle root over the full set detects silently dropped objects.
    Added Section 8 explicitly scoping this as an export/import substrate

    read more

  • @jonny@neuromatch.social honestly good for you for investing the time to critique this knowing it's AI (adjacent or wholesale) involvement.

    read more

  • @julian @PortaFed
    giving a further read: I can't really imagine a case where someone would a) regularly be creating signed backups and also b) know in advance where you wanted to migrate to to set the destination_did. Like if this is for the case where the instance has shut down, you might have some signed backup, but you probably haven't planned in advance where you would want to migrate, and if the instance is down you wouldn't be able to create the migration object after the fact.

    the validation strategy for the export is sort of mystifying to me. if the whole object is signed, then why would you need a merkle tree for objects and also an object count? if the contents of the object have changed post signing, then the signature validation will just fail and those are irrelevant.

    true to form for LLM generated documents, several critical things are left undefined, like what last_accepted_sequence is or how that works.

    probably the most important problem is that it's not really clear how all other instances are supposed to handle this, which is the entire hard part of a migration spec. Like, if the purpose here is to preserve identity, then you would need to have all the other instances come to see the new identity as being equivalent to the old identity, and there's no discussion of how that process works for third-party instances at all. like e.g. in FEP-1580 i had to spend a long time gaming out scenarios for how third party instances would handle a move event.

    so without that it's not really an account portabiltiy spec, it's an account export/import spec, which is fine, just not really needed since signing objects and collections (which this spec should use anyway) is already described by other specs.

    read more

  • @silverpillThank you , these are important corrections and I appreciate you taking the time.
    You're right on both points. I'll update the spec to reflect that FEP-ef61 authority is not actor-rooted in the way I described, and that migration is possible via outbox export-import. I was overstating the gap.
    The distinction I was trying to draw is narrower:

    read more

  • @PortaFed

    I have a couple of comments regarding the spec https://codeberg.org/portafed/portafed/src/branch/main/portafed-spec/spec.md

    It contains a comparison with FEP-ef61, but it is not quite correct:

    - FEP-ef61 identity is not actor-rooted. The closest equivalent of FEP-ef61 identity in normal ActivityPub is a server with a domain name. A single FEP-ef61 authority can manage multiple actor documents.
    - FEP-ef61 does not lack a migration flow. Strictly speaking, it doesn't need one, because data is not attached to a server and can be continuously synchronized between multiple servers. But a more familiar migration flow is also possible via outbox export-import.

    @lutindiscret

    read more

  • @benpate That would be great and happy to contribute wherever it fits.
    My guess on the scope decision is the same as yours: hostile-server recovery is genuinely harder, and a cooperative spec is already a lot to get right. Makes sense to tackle it separately.
    Take your time reading. I'll put together a short write-up of how MigrationProof could slot into the existing spec easier to react to something concrete than to an abstract pitch.

    read more

  • @jonny@neuromatch.social tracks doesn't it 😝

    read more
Post suggeriti
  • 0 Votes
    3 Posts
    14 Views
    @Neko0001 bonjour ! Bon WE a vous aussi.
  • 0 Votes
    2 Posts
    5 Views
    Merci @GillesLeCorre2 plein de belles choses a vous deux. 🙏P.S. ça c'est passé comment cette nuit avec les bruyant voisins?
  • 0 Votes
    1 Posts
    12 Views
    Destroying Autocracy – November 13, 2025Welcome to this week’s “Destroying Autocracy”.It’s your source for curated news affecting democracy in the cyber arena with a focus on protecting it. That necessitates an opinionated Butlerian jihad against big tech as well as evangelizing for open-source and the Fediverse. Since big media’s journalism wing is flailing and failing in its core duty to democracy, this is also a collection of alternative reporting on the eternal battle between autocracy and democracy. We also cover the cybersecurity world. You can’t be free without safety and privacy.FYI, my opinions will be in bold. And will often involve cursing. Because humans. Especially tech bros. And fascists. Fuck ’em.The Programmer’s Fulcrum is the future (and smaller) home for a fusion of Symfony Station and Battalion. Its tagline is Devs Defending Democracy, Developing the OMN.You can sign up now and for 2025 get an email with links to and featured articles for each week’s Symfony Station Communiqué and Battalion “Destroying Autocracy” post along with their featured articles. And you’ll be set with TPF after the fusing.We are posting on the Fediverse now at @thefulcrum @thefulcrum.dev and original website content will start in 2026.Featured Item(s)Wrekage/Salvage writes:Once you’ve seized the tools of political life to build communal power, it’s hard to forget what a hammer feels like in your hand.Bonfire Networks is a tiny software org that has spent the past couple of years building a framework for communities on the open social web. At the end of last week, they released Bonfire Social, a microblogging app.Like Mastodon, Bonfire Social runs on ActivityPub, but it takes differently opinionated approach to sociability.(It has) features I (and many others) have been advocating for in Fediverse software for years, often while people explained at length that such things simply could not be implemented.Most exhilarating to me, though, is that they aren’t just building another microblogging app. They’re making a toolkit for internet community software that is healthy and good and designed around real human needs from the start.As they put it in their crowdfunding campaign, they’re making building blocks for communities on the open social web.Sparks fly upTotal awesomeness that needs to blow up. We will cover (and support) Bonfire extensively on The Programmer’s Fulcrum.We start and end with good news to make the middle bearable.The response to Russia’s War Crimes, Techno Feudalism, and other douchebaggeryThe Kyiv Independent reports:Ukraine slaps new sanctions on Putin’s team and propagandist publishersRadio Free Europe reports:EU ‘Democracy Shield’ Aims To Counter Russian DisinformationOpen Web Advocacy has:Tim Berners-Lee On Apple’s Browser Engine Ban and Web AppsHeise reports:Office alternative from Germany by Ionos and Nextcloud is now availableGreat.Speaking of Germany, The Guardian reports:ChatGPT violated copyright law by ‘learning’ from song lyrics, German court rulesMeta could face millions in fines for not signing content deals in AustraliaDigital Rights Bytes asks:Can the government read my text messages?404 Media reports:Judge Rules Flock Surveillance Images Are Public Records That Can Be Requested By AnyoneTechCrunch reports:Wikipedia urges AI companies to use its paid API, and stop scrapingBrookings says:We should all be LudditesPreach brother.Poynter reports:As independent newspapers disappear, a secretive alliance fights to save themNeutralOpen Knowledge shares:Open letter: Harnessing open source AI to advance digital sovereigntyThe Ringer has:How Catastrophic Is It If the AI Bubble Bursts? An FAQ.The Evil Empire (AKA Autocracy) Strikes Back404 Media reports:DHS Gives Local Cops a Facial Recognition App To Find ImmigrantsTechCrunch reports:Why a lot of people are getting hacked with government spywareLawmakers warn Democratic governors that states are sharing drivers’ data with ICEEuractiv reports:EU’s red tape bonfire puts AI ahead of privacy protectionNOYB reports:EU Commission internal draft would wreck core principles of the GDPRThe Guardian reports:The EU has let US tech giants run riot. Diluting our data law will only entrench their power.Tech giants vow to defend users in US as spyware companies make inroads with Trump administrationFreedom of the Press Foundation reports:Kansas county pays $3M for forgetting the First AmendmentPariah StatesBleepingComputer reports:APT37 hackers abuse Google Find Hub in Android data-wiping attacksBitDefender reports:Russian hacker admits helping Yanluowang ransomware infect companiesThe Register reports:UK asks cyberspies to probe whether Chinese buses can be switched off remotelyKrebs on Security reports:Google Sues to Disrupt Chinese SMS Phishing TriadBig MediaThe Columbia Journalism Review has:Editorial Independence Means Technological IndependenceThe Open Media Network peeps.The Guardian reports:EU investigates Google over ‘demotion’ of commercial content from news mediaBig TechAnd:Big Tech’s control freak era is breaking itself apartThe Techno Anarchist Manifesto lists tools to help you avoid most of this AI horseshit.Lies, damned lies and AI: the newest way to influence elections may be here to stayJesus.Digital colonialism: the new frontier of Latin American dependency.A side effect of techno feudalism.PC Mag reports:Asking ChatGPT About Affairs or Abortion? Be Careful, Marketers Are Peeking at Your PromptsCybersecurity/PrivacyThe Register reports:OWASP Top 10: Broken access control still tops app security listIEEE Spectrum reports:Your AI Agent Is Now a Target for Email Phishing. New tools can help thwart the attacks.Like bitcoin, if you use this shit you deserve what you get.DarkReading reports:Orgs Move to SSO, Passkeys to Solve Bad Password HabitsGlassWorm Returns, Slices Back into VS Code ExtensionsCheck out VS Codium friends.BleepingComputer reports:Police disrupts Rhadamanthys, VenomRAT, and Elysium malware operationsFediverseElena Rossini shares:The rebellion will be federated – 2025 editionA New Social has:Bonfire and A New SocialBonfire explains:Matters of care – why Bonfire maintenance comes first.Comciencia has:A comunicação da ciência no FediversoLaura Hargreves shares:Growing My Own Little Fediverse: The Joy of Going Further Down the Rabbit HoleInside My Matrix: How I Reclaimed Messaging from the CloudTechCrunch reports:Threads targets podcasters with new features, aiming to become the home for show discussionsBTW, fuck Threads.Slightly Decentralized Social MediaThe Dabbler has:Chicken Caesars: they’re messing with your Bluesky feedTechCrunch reports:Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archiveHmm, this is built with Nostr.CTAs (aka show us some free love)That’s it for this week. Please share this edition of Destroying Autocracy.Follow me on the Fediverse. Or this site via the button in the footer. Or via RSS. Or even our future home in 2026, if you want a head start.Keep fighting!Ringleader, BattalionReuben Walker Follow me on the Fediverse#activitypub #ai #autocracy #bigJournalism #bigTech #bluesky #bonfire #bridgyfed #democracy #fascism #fediverse #matrix #stopChina #stopIsrael #stopRedAmerica #stopRussia #supportUkraine #technoanarchism #technofeudalism #threads #xmpphttps://battalion.mobileatom.net/?p=3838
  • 0 Votes
    1 Posts
    18 Views
    Mastodon has a concept called "pinned statuses", which is a special collection attached to a Person actor. https://docs.joinmastodon.org/spec/activitypub/#featured It wasn't readily known how this collection is updated and federated (not without code achaeology), but claire@social.sitedethib.com recently shared some additional info :smiley: The actor itself will issue an Add activity targeting the collection with the status in object. This activity is sent to all followers of the actor. No activity is sent if the actor has no remote followers. A Remove is sent when a pinned post is unpinned. This is what the Add looks like: { "@context": "https://www.w3.org/ns/activitystreams", "type": "Add", "actor": "https://example.org/users/testUser", "target": "https://example.org/users/testUser/collections/featured", "object": "https://example.org/users/testUser/statuses/115266412340579560" } The corresponding Remove is identical except for type, which is of course, Remove.