Github losing it's place as *the* center for free/open source development is a good thing.
Replacing it with a new singular centralized piece of infrastructure is a horrible idea, and a great way to have the same fucking problems you have now, but sometime later.
Decentralizing has it's own problems and complications, but, especially for free/open projects, being dependent on a centralized service was never a good idea in the first place.
Post
@miss_rodent @OpenArchive i think we eventually have to flip the archiving situation from "central archive that does lawsuits against publishers and defends against nothing" to "independent archives which prepare from the start to survive hostile takeover"
@hipsterelectron @OpenArchive Yeah, agreed. Centralized archives, even if well-managed, are vulnerable. Redundancy, spread, & decentralization - especially across jurisdictions, social-political-legal contexts, etc. is important, and a lot more robust. (and likely less prone to bias)
@miss_rodent @OpenArchive the fact that openarchive understands that its content is potentially illegal according to a fascist state means it's considered more of these eventualities. i think this is something other archives can learn from. a lot more becomes "illegal" under fascism
@hipsterelectron Yeah, it's dangerous to assume any content may be legal/allowed in perpetuity. Prior to the nazis taking over germany, research into queer & trans people & medical transition was safely legal; that changed very quickly once the nazis took over.
What is legal/protected speech today may become a crime arbitrarily at any point, under new leadership...
@miss_rodent @hipsterelectron In light of all this, archives really should be using content-addressed storage. Makes it easy to mirror and far less productive to try to do takedowns against.
@dalias @miss_rodent there are zero standard protocols in this space which is why IPFS keeps trying to make itself happen. personally i would do some sort of CAS with asymmetric crypto involved somewhere to address the separate problem of surveilling who's uploading and downloading files but i haven't at all figured that part out yet. agree that CAS solves several problems at once and we need not be limited to bittorrent
@hipsterelectron @dalias @miss_rodent Along these lines, would it be possible validate the source of an archive (e.g. that a archive of a webpage hasn't been tampered with)?
I've wondered if it would be possible to record a tls session to use for this, but I haven't done much research / wasn't able to make much sense of it when I did. Would everything interesting be encrypted with the public key of the client, so it could be easily tampered with anyway?
@aren @hipsterelectron @miss_rodent Nope. At least AIUI, TLS intentionally does not provide non-repudiation. I'm pretty sure you can always forge a session that's indistinguishable from a real one.
@aren @hipsterelectron @miss_rodent IIRC this is just a consequence of the private keys only being used for Diffie-Hellman, not for signing anything that's part of the session. Someone please correct me if I'm completely off on this, but it sounds right.
@dalias @aren @miss_rodent i have an even weaker belief that that is correct and how it works. there are a lot of cool things to do with identity here. i would probably start by decoupling identity from TLS which of course doesn't solve the issue unless the web were accessed through a separate format that made such an identity accessible. i think it would be a useful feature for a website to have to enable cryptographic non-repudiation
@dalias @aren @miss_rodent the ability to do so makes it a choice not to do so
@hipsterelectron @aren @miss_rodent It should already be possible. The web server could just add a custom HTTP header containing a signature for its half of the DH exchange.
@hipsterelectron @aren @miss_rodent Actually I'm not sure if that helps anything or if you can still forge the payload anyway, knowing the symmetric key for the session. I'd have to think about it some more.
@dalias @aren @miss_rodent i refuse to become familiar with TLS but this demonstrates why that would be useful until my vaporware finally comes to light