Skip to content
0
  • Home
  • Piero Bosio
  • Blog
  • World
  • Fediverso
  • News
  • Categories
  • Old Web Site
  • Recent
  • Popular
  • Tags
  • Users
  • Home
  • Piero Bosio
  • Blog
  • World
  • Fediverso
  • News
  • Categories
  • Old Web Site
  • Recent
  • Popular
  • Tags
  • Users
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone
portafed@mastodon.socialundefined

PortaFed

@portafed@mastodon.social
About
Posts
4
Topics
1
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Introducing PortaFed — cryptographic account portability for #ActivityPub
    portafed@mastodon.socialundefined portafed@mastodon.social

    @benpate That would be great and happy to contribute wherever it fits.
    My guess on the scope decision is the same as yours: hostile-server recovery is genuinely harder, and a cooperative spec is already a lot to get right. Makes sense to tackle it separately.
    Take your time reading. I'll put together a short write-up of how MigrationProof could slot into the existing spec easier to react to something concrete than to an abstract pitch.

    Fediverso activitypub fediverse

  • Introducing PortaFed — cryptographic account portability for #ActivityPub
    portafed@mastodon.socialundefined portafed@mastodon.social

    @benpate Yes, that’s exactly the gap I’m aiming at: the case where the old server is gone, hostile, or unavailable, and the user needs some way to carry forward verifiable account state without relying on that server’s cooperation.
    My reading is that LOLA covers the cooperative portability path well, while this harsher failure case still needs more work. I don’t see PortaFed as a competing standard so much as a possible building block for that scenario.

    Fediverso activitypub fediverse

  • Introducing PortaFed — cryptographic account portability for #ActivityPub
    portafed@mastodon.socialundefined portafed@mastodon.social

    @julian @julian@activitypub.social Yes, fair question and you deserve a direct answer.

    The README and proposal documentation were drafted with AI assistance
    (Claude/Anthropic) and then reviewed and edited by me. The cryptographic
    design ed25519 keypairs, JCS/RFC 8785 canonicalisation, Merkle
    construction, MigrationProof signing input is my own technical work.

    The Rust code in portafed-core implements real cryptographic primitives
    and passes real tests. It is not generated boilerplate.

    Fediverso activitypub fediverse

  • Introducing PortaFed — cryptographic account portability for #ActivityPub
    portafed@mastodon.socialundefined portafed@mastodon.social

    Introducing PortaFed — cryptographic account portability for #ActivityPub

    When your server shuts down, your identity and posts are gone.
    PortaFed fixes this with a MigrationProof: a Merkle commitment
    over your full export, signed by your ed25519 key, verifiable
    by any destination server without contacting the origin.

    No blockchain. No registry. No core spec changes.

    Spec + Rust implementation:
    https://codeberg.org/portafed/portafed

    Feedback welcome — especially from server maintainers.

    #Fediverse

    Fediverso activitypub fediverse
  • 1 / 1
  • Login

  • Login or register to search.
  • First post
    Last post