@prologic@twtxt.net hey, nice!
Iām watching that he uses a twtxt format with the newest twts at the start of the txt file.
Besides being easier to read for a human and āharderā to write for a script, does it have any benefit youāve seen?
@xuu@txt.sour.is Well, it took me like 4 hours to set up, implement and test the PHP library, with all the setup combinations, devices and such.
So Iāll say that using a password with a simple function like https://www.php.net/manual/en/function.password-verify.php
is much easier than a whole library requiring communication between the server, the browser and the auth deviceā¦ There is a security reason for that (mainly to avoid phishing, which is something I like compared to other solutions like SQRL)
You can take a look at the library Iām using, here:
https://eapl.mx/webauthn/_test/client.html
And the implementation there:
https://eapl.mx/twtxt/login.html
Whatās missing in the examples is having an identity tied to your Auth device (Hardware token or OS service like Microsoft Hello, Apple Keychain, Android Fingerprint). The explanation is long, but the abstraction is there. Your identity and private certificates are held for you by some āmagicā device.
@justamoment@twtxt.net that said, WebAuthn/FIDO 2/PassKeys are not that easy to implement but I think they have many improvements for the Authentication problem
@justamoment@twtxt.net sure! Iām working on a proof of concept (in PHP) if you want to take a look on how it works
@movq@www.uninformativ.de Great movie! even if itās āoldā by now is very valid in the term of living for the expected transparency and the public spectacle. it makes you think a lot
@prologic@twtxt.net there is, the issue is making those 3 to work together in a semi-cooperative environment. Itās possible with the right incentives
@movq@uninformativ.de is it perhaps a Hacker mindset of breaking things?
I was reading on Hacker News the other day about the collide of different personalities in the same space. Those wanting to give maintenance to existing systems (the stereotype of IT guy), the hackers (breaking stuff because why not) and the developers (building thinks to solve problems).
And in an environment of earning money to make a living. Everything together sounds like a recipe for a very āfunā place to work.
Yep, so you can recover your password, I think. About the real IP address, no idea whoās receiving it.
@prologic@twtxt.net Iād like to have a 2FA alternative, at least TOTP (what Google Authenticator uses).
And if you have support for WebAuthn, even better.
Both are self-hostable.
@walves@twtxt.net hey walves!
I assume you have created an account on twtxt.net and you can see this message.
What have you used on Windows? The twtxt client on Python? (itās broken on newest versions of python), if you want your .txt file to be available publicly you could host it in some server or running the twtxt client from some tilde or VPS.
Or use Twtxt.net (which is a Yarn.social server) to manage following other users, receiving mentions, replying to other twts, and such. It creates and serves the text file for you, from a web and mobile interface.
Or you can use various clients (from a terminal) to insert net lines (twts) to the file, and also to read other usersā files. Newest versions have extended the protocol to allow replies, hashtags and such.
I use both, in English I like twtxt.net/yarn.social since itās easy to talk as a community. In Spanish I use the traditional approach of hosting a file, more like a micro log.
@abucci@anthony.buc.ci Nice!
I didnāt know about https://indieauth.net which seems to be based on OAuth 2.0 (that I have used before), Iāll take a look!
@prologic@twtxt.net well, not 100% right but itās a valid assumption.
If you are able to reset your password by email, itās a pretty similar level of security than receiving an access token by email. Anyone with access to your mail could get access to your accounts.
Adding a second factor of authentication could help, or using something with Public/Private cripto would be better, like Client Certs, Fido2 or even hipster things.
And also giving alerts that someone else is connected in your behalf is great (like is done for some banks or Google) , but thatās a UX compromise between convenience and security.
@prologic@twtxt.net I think the Warning is misleading thenā¦
So itās not disabled, but not setup correctly and for that reason doesnāt send mails?
Sure! Here? https://git.mills.io/yarnsocial/yarn/issues
@prologic@twtxt.net Nice!
@prologic@twtxt.net likely the root cause š
@justamoment@twtxt.net @prologic@twtxt.net sorry for the typos, stupid phone keyboard (and myself not paying attention, ha)
@justamoment@twtxt.net thanks for sharing! magic links have a few problems, although itās a useful way to avoid passwords. I like it for some kind of users.
I wrote a bit about different approaches for Dynamic passwords and passwordless systems if anyone here is interested
@prologic@twtxt.net @justamoment@twtxt.net Same! Itās not arriving to my Proton.me/Protonmail inbox, nor Spam.
@justamoment@twtxt.net @prologic@twtxt.net hey, didnāt know that! , as a fan of magic links, I like that itās available, but āLogin with you Email Addressā doesnāt make obvious you are going to receive a Dynamic token to your email, in my mind is like āInstead of your Username and Pwd, user your Email and Pwdā
Iād suggest something line āSend an access to your emailā, āSend a Magic linkā, etc.
@akoizumi@social.kyoko-project.wer.ee I like it, buuut I think itās not so easy to implement from the server side, and to setup for most users.
That said, itās a classic alternative
@prologic@twtxt.net š®
Today I found this passwordless alternative by Steve Gibson
https://sqrl.grc.com/pages/what_is_sqrl/
@~eaplmx@texto-plano.xyz I forgot to add, in the Sign up you donāt need a password currently, that will be used later to avoid that anyone could register their device as a valid login.
Also, this is a sandbox, donāt take this workflow as an inspiration for any production ready site.
@~eaplmx@eapl.mx If any of you reading this wants to try a stupidly simple WebAuthn/Passkey workflow, go here:
https://eapl.mx/twtxt/signup.html
And then:
https://eapl.mx/twtxt/
If you did that correctly, youāll reach the āWrite your twtxt hereā part, (but youāll have to guess the password, muahaha)
Thatās my progress for today, it took longer than expected, I havenāt developed in PHP, and forgot the details on file permissions, binary data for cryptography and such. Besides that, it has been a cool exercise.
@mckinley@twtxt.net does it happen? š® Didnāt know
The main issue Iām currently having with the implementation of WebAuthn in my personal service is the concept that a user only has 1 password but 1..N auth devices š¤
@prologic@twtxt.net Could it work in the Southern USA called Mexico š²š½? š
Just joking, I think it could be used for some digital services, Amazon, Digital Ocean, or similar š¤
@prologic@twtxt.net thatās why Iām asking that many questions.
Another one, when a resource is available in multiple places, like Gopher, HTTP and Gemini (and IPFS, why not?), are there going to be N registries?
Wild idea, how about using the HTTP response codes https://developer.mozilla.org/en-US/docs/Web/HTTP/Status or from Gemini https://gemini.circumlunar.space/docs/specification.gmi
Like 308/31 for redirections, 410/52 for Gone and such
@lyse@lyse.isobeef.org Interesting, let me seeā¦
Iām out of context, why do we need this? (As a community of users and developers, I think)
Iām reading:
The goal is to provide a database that can be fetched periodically to receive a
list of twtxt feed URLs that are known to be wrong for whatever reason.
āWrong for whatever reasonā is too vague in my mind, doesnāt help me to understand how itās useful, I think specific reasons would be better like āFile name changedā, āDomain changedā, āURL not available anymore/Gone foreverā and such could be easier to understand.
What would happen if two URLs have changes, you take the most recent one?
Whoās gonna be the main user? Systems like Yarnd checking for changes to auto-correct broken links?
These are my first impressions, and not wanting to say something wrong, it looks appealing. Kudos for the initiative!
@abucci@anthony.buc.ci youāll be surprised how many people spend on things we donāt understandā¦
@prologic@twtxt.net this one https://adarkroom.doublespeakgames.com/mobileWarning.html
I think this is a better link https://github.com/amirrajan/survivingtheappstore/blob/master/manuscript/dev-logs-part-2.md#day-246āfeb-7-2014-a-hail-mary-to-editors
@prologic@twtxt.net I donāt have any blind friend, so I havenāt experienced firsthand how is to play a game like that.
But Iād like to recommend one of my favorite text based games, pehaps itās something appealing to you
https://github.com/amirrajan/survivingtheappstore/blob/master/manuscript/blind.md
@justamoment@twtxt.net the Readme needs work but you can see the current PHP file here https://github.com/eapl-gemugami/phpub2twtxt
Disclaimer: Itās the first playable, ha, and I havenāt touched PHP in months
@darch@neotxt.dk Hey, I recognized a known name among the forks, itās simple and it works! Thanks
@prologic@twtxt.net Mario, the plumber!
What have you been doing for the last 5 years? š
@prologic@twtxt.net itās a nice one, similar to Mario Odyssey
@rob@twtxt.net the game ? wow!, 5 years already
As with the example of the gun, designed to kill people, vs the knife to cook, that could be used to kill someone. Money is not moral, but the monetary systems are. Thatās the tricky part.
As a scientist, I always have to remind: āScientists were so preoccupied with whether or not they could, they didnāt stop to think if they should.ā
Thatās where āgoodā intentions like Google with the ādonāt be evilā motto, suddenly, get evil. A search engine is cool. A whole company designed to sell usersā data, not so much. The same thing with anything to store value, itās tightly connected with power, and that may show the worst part of humans.
@prologic@twtxt.net, Iāll only add that Bitcoin as the āfirstā massive cryptocurrency is a vast social experiment, appealing to me as a hacker.
But as with many āsuccessfulā experiments itās going out of control. Currently, there are 9k+ different cryptocurrencies, each one trying to improve over the previous, or at least promising new things, and thatās where the promises are not going to be fulfilled. Itās easiest to promise a nicer future than to actually achieve it.
I canāt say every crypto + currency system is evil or good. Thatās ideology, oversimplification appealing to our emotions. āMoney is the root of all evilā is BS, the real quote is āthe love of money is the root of all evilā. Iāll say itās the same for Cryptocurrencies. Fanaticism and cult behaviour is the bad part IMO.
@prologic@twtxt.net Nevermind, it was a case of RTFM https://docs.flutter.dev/deployment/android
@tkanos@twtxt.net haha, I think itās a Layer 8 error
@prologic@twtxt.net Iām typing from the Goryon app right now.