We’re evaluating Keyhive for use in our distributed chat application and my colleague wrote an in-depth explainer on Keyhive’s underlying Key Encapsulation Mechanism BeeKEM, which is a decentralized offshoot of TreeKEM used in MLS: http://meri.garden/a-deep-dive-explainer-on-beekem-protocol/
dannyobrien 127 days ago [-]
Thank you for writing this -- it clarified a lot for me in the original piece!
NeutralForest 128 days ago [-]
Ink and Switch has been such a source of joy for me. I like reading their articles because they come from such a different place than what you currently see in most software (Cloud based subscriptions). Just a breath of fresh air backed by cool tech and cool people. Thanks!
Too 128 days ago [-]
Their claim that every request goes through the hot path of a central auth db is stretching the truth quite a bit. With Oauth2 you get a signed access token once from the Id Provider, then you reuse this token several times until it’s given expiry time has run out. It is up to the resource server to validate the token scope, signature and the expiry time. This can be done offline as long as the resource server has the public key of the IdP. Ssh certificates work the same way.
Obviously, now the resource server instead becomes your central guard of access, and is far from a local-first crypto based solution as they describe. Just that the way it’s pictured sounded overly dramatic.
ctm92 128 days ago [-]
That callout card on the top of the site really messed with my brain with it being slightly tilted
eqvinox 128 days ago [-]
Same here, plus the underlining is seriously triggering me o.O
stronglikedan 128 days ago [-]
Probably designed by a "full stack developer" instead of a designer.
Terretta 125 days ago [-]
They have a similar article on why.
Xss3 128 days ago [-]
Oh man i hate that with a passion.
Devs, why?
benchloftbrunch 128 days ago [-]
Note: this has absolutely nothing to do with the Windows registry, despite the name
chr15m 128 days ago [-]
Cool. I think you could use a CRDT (even a simple LWW structure) on top of Nostr which already works and has all of the properties you are looking for.
jakelazaroff 128 days ago [-]
Could you explain how, for people not familiar with Nostr?
chr15m 128 days ago [-]
On further review this is quite a lot further developed than what I suggested above. Sorry for the noise!
pvh 128 days ago [-]
It does indeed turn out to be a difficult and subtle problem. We've tried to balance minimizing novelty (always risky in cryptographic systems) with achieving the various security and scaling properties we're looking for. We're very lucky at Ink & Switch to be working with Brooke Zelenka on this one.
richwisdomwise 128 days ago [-]
[flagged]
Rendered at 08:27:29 GMT+0000 (Coordinated Universal Time) with Vercel.
Obviously, now the resource server instead becomes your central guard of access, and is far from a local-first crypto based solution as they describe. Just that the way it’s pictured sounded overly dramatic.
Devs, why?