GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    feld (feld@friedcheese.us)'s status on Thursday, 15-May-2025 23:03:20 JST feld feld
    in reply to
    • Ignas Kiela
    • Wolf480pl
    • Quad
    @ignaloidas @wolf480pl @quad I think all that happened was the industry pivoted to Apple's implementation? I get automatic Cloudflare bypass with Safari because of it

    https://blog.cloudflare.com/eliminating-captchas-on-iphones-and-macs-using-new-standard/
    In conversation about a day ago from friedcheese.us permalink

    Attachments


    1. Invalid filename.
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:23 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe What if it turns out webauthn attestation is useful as a captcha / anti-sybil mechanism?FWIW Cloudflare did try that, I don't think anyone was a fan of that and I think they stopped? IDK didn't follow it closely, but it had problems


      But I don't think that things are going to change from how they are right now. There is little incentive for 99% of websites to care about attestation, and because implementing it is extra work than not, I don't see that changing, ever.

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:24 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad okay

      Can you promise me thay this won't change in 5 years, due to tangential events?

      What if it turns out webauthn attestation is useful as a captcha / anti-sybil mechanism?

      Considering that the technical design permits a power shift away from users, how do I know that power shift won't be realized?

      In conversation about a day ago permalink
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:26 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe If it is, it is in no way done through attestation - maybe through abusing their existing monopoly, marketing, and lack of key extraction from their devices - but that's far, far from the "everyone will require attestation and the only attestation that will work will be google's and apple's" that you seem to be proposing

      They themselves do not enforce attestation at all, and eveything about suggesting checking attestation on the web is marked as "if you're a high-risk business, you might want to do this, otherwise, don't bother"

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:27 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad
      I claim that this is Google & Apple's attempt at a vendor lock-in

      In conversation about a day ago permalink
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:28 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe I don't see it like that at all

      like absolutely the fuck not

      There are legitimate reasons for both sides of the coin

      You're acting as if the decision of some businesses to act more carefully is a part of a plan to lock everybody in to only a cabal of cryptographic implementations and then never let anyone touch their own private keys ever again

      This view is just plain paranoia and conspiracy theory. I legitimately cannot understand how are you equating these things together. Genuinely, WTF

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:30 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad this is like saying "it doesn't matter the ruling party demolished the Supreme Court, because they're not passing any unconstitutional bills yet, except those two minor.ones I don't care about"

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:31 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad you are completely missing the point

      In conversation about a day ago permalink
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:32 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe shrug, as I said, very few websites actually restrict it to "strong" devices.

      and them asking for strong devices is kinda equivalent to them asking for strong passwords. they are taking on a risk as well, so they have a valid reason to mitigate it.

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:34 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad having a key trapped in TPM is fine if that's what I chose to do.

      Having no option to make some keys to less important / rarely visited sites exportable feels wrong tho.

      It's not even about the final decision, it's about who makes the decision.

      If I make decision X because I think it's good for my usecase, that's fine.
      But if I make the same decision X, in the same usecase, because it was the only option some company made available, that's oppression

      In conversation about a day ago permalink

      Attachments


    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:36 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe

      Unless the RP is braindead stupid, you should be able to add multiple credentials to each one. That's the standard way to do things. Heck, I've seen a guy on HN say that he added "passkeys" from each of his devices to the services he logs into, even though they don't share it.

      I have like 4 separate physical keys, with some in cold storage and stuff, and they all get registered on most of my logins. There's no other way to do stuff if you're using physical keys, even. So IMO having a key trapped in a TPM is almost zero disadvantages from usability side, and plenty of advantages from security side.

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:37 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad I need to be able to migrate between devices / OSes / implementations.

      Until there's a common API for rotating credentials that all RPs implement, the only realistic way to do that is to export the credentials from the old device and import them to the new one.

      In conversation about a day ago permalink
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:38 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe idk, it's more that, you don't particularly really need to have the ability to get the plaintext of the private key for what this thing is built for. And the ability presents potentials for attacks, and some companies would rather not deal with the "higher risk" credentials if the payout from popping the credential is quite high.

      Genuinely don't really see a need to have a simple to pop credential for daily use. For experimenting - sure, but you don't really need such credentials to work on every website anyways.

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:39 JST Wolf480pl Wolf480pl
      in reply to
      • Ignas Kiela
      • Quad

      @ignaloidas @quad
      > you can do whatever you want, there's just institutional pressure to make your thing useless

      thanks, that cleared all my worries

      In conversation about a day ago permalink
    • Embed this notice
      Ignas Kiela (ignaloidas@not.acu.lt)'s status on Thursday, 15-May-2025 23:03:40 JST Ignas Kiela Ignas Kiela
      in reply to
      • Wolf480pl
      • Quad

      @wolf480pl@mstdn.io @quad@akko.quad.moe I mean, you can implement your own stuff and nobody really restricts what you can do with those private keys

      it's just that some websites might not trust your implementation to be secure enough to rely upon (makes sense for some, doesn't for others).

      In conversation about a day ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Thursday, 15-May-2025 23:03:42 JST Wolf480pl Wolf480pl
      • Quad

      @quad AFAIK they're a combination of public key auth, UX, and stupid software restrictions meant to reduce your ability to do whatever you want with your private keys

      In conversation about a day ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.