Discussion
Loading...

Discussion

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
jbz
jbz
@jbz@indieweb.social  ·  activity timestamp 4 hours ago

"On top of that, the project uses a decentralized messaging fabric that can be REST, DIDComm, or another trust‑spanning protocol. This enables participants to establish relationships and exchange credentials without revealing their physical location or network topology. Each relationship uses its own random, ephemeral DIDs, making it far harder for observers running messaging infrastructure to infer who is talking to whom or to map the kernel's social graph"

  • Copy link
  • Flag this post
  • Block
jbz
jbz
@jbz@indieweb.social  ·  activity timestamp 4 hours ago

"On top of that, the project uses a decentralized messaging fabric that can be REST, DIDComm, or another trust‑spanning protocol. This enables participants to establish relationships and exchange credentials without revealing their physical location or network topology. Each relationship uses its own random, ephemeral DIDs, making it far harder for observers running messaging infrastructure to infer who is talking to whom or to map the kernel's social graph"

  • Copy link
  • Flag this comment
  • Block
jbz
jbz
@jbz@indieweb.social  ·  activity timestamp 4 hours ago

#linux #kernel #auth #opensource
https://www.zdnet.com/article/linux-kernel-maintainers-new-way-of-authenticating-developers-and-code/

ZDNET

Linux explores new way of authenticating developers and their code - here's how it works

Linux kernel maintainers propose a less painful process for identifying developers. See how it can make Linux code safer than ever.
  • Copy link
  • Flag this comment
  • Block
jbz
jbz
@jbz@indieweb.social  ·  activity timestamp 4 hours ago

"On top of that, the project uses a decentralized messaging fabric that can be REST, DIDComm, or another trust‑spanning protocol. This enables participants to establish relationships and exchange credentials without revealing their physical location or network topology. Each relationship uses its own random, ephemeral DIDs, making it far harder for observers running messaging infrastructure to infer who is talking to whom or to map the kernel's social graph"

  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.34 no JS en
Automatic federation enabled
Log in
Instance logo
  • Explore
  • About
  • Members
  • Code of Conduct