Citiverse
  • julian@activitypub.spaceJ
    214
    0

    Something we need. Looks to be NLNet funded? The README looks to be AI written, it contains a lot of the confident triple-statements often found in LLM-generated content. I hope that is as far as it goes because this might be brushing up against NLNet's generative AI policy: https://nlnet.nl/foundation/policies/generativeAI/

    @portafed@mastodon.social may I ask whether LLM was used in the production of this project/code?

  • P
    4
    0

    @julian @julian@activitypub.social Yes, fair question and you deserve a direct answer.

    The README and proposal documentation were drafted with AI assistance
    (Claude/Anthropic) and then reviewed and edited by me. The cryptographic
    design ed25519 keypairs, JCS/RFC 8785 canonicalisation, Merkle
    construction, MigrationProof signing input is my own technical work.

    The Rust code in portafed-core implements real cryptographic primitives
    and passes real tests. It is not generated boilerplate.

  • mpb@typent.netM
    3
    0

    Bravo! I like the idea, and honestly I was thinking of making something similar myself. Maybe I’ll implement it into my platform.

  • benpate@mastodon.socialB
    9
    0

    @PortaFed ~ do you think these ideas would work alongside the existing work being done by the W3C social web community group? https://swicg.github.io/activitypub-data-portability/lola

    I *think* you're solving the issue of "my server disappeared, I don't have a backup, and I can't prove I'm still me." Is this close?

    Because that's the one use case that the portability spec DOESN'T do. So, maybe there's a way for us to work together, instead of making competing standards.

    @julian @evan @jonny @PortaFed

  • P
    4
    0

    @benpate Yes, that’s exactly the gap I’m aiming at: the case where the old server is gone, hostile, or unavailable, and the user needs some way to carry forward verifiable account state without relying on that server’s cooperation.
    My reading is that LOLA covers the cooperative portability path well, while this harsher failure case still needs more work. I don’t see PortaFed as a competing standard so much as a possible building block for that scenario.

  • benpate@mastodon.socialB
    9
    0

    @PortaFed That's awesome. Let's work you into the existing effort. We could use all the help we can get.

    Also: I'm pretty new to the data portability spec; so I know that "hostile server" is out of scope, but I wasn't there to know why that choice was made. I'm *guessing* is was too much to tackle at the time.

    But one way or another, it would be great to have something in place for this situation, too.

    I still need to read your work fully, so I understand what we're talking about 🙂

  • jonny@neuromatch.socialJ
    2
    0

    @julian
    @evan @benpate @PortaFed
    Can't make heads or tails of this one

  • P
    4
    0

    @benpate That would be great and happy to contribute wherever it fits.
    My guess on the scope decision is the same as yours: hostile-server recovery is genuinely harder, and a cooperative spec is already a lot to get right. Makes sense to tackle it separately.
    Take your time reading. I'll put together a short write-up of how MigrationProof could slot into the existing spec easier to react to something concrete than to an abstract pitch.


Citiverse è un progetto che si basa su NodeBB ed è federato! | Categorie federate | Chat | 📱 Installa web app o APK | 🧡 Donazioni | Privacy Policy

Il server utilizzato è quello di Webdock, in Danimarca. Se volete provarlo potete ottenere il 20% di sconto con questo link e noi riceveremo un aiuto sotto forma di credito da usare proprio per mantenere Citiverse.