We’re evaluating Keyhive for use in our distributed chat application and my colleague wrote an in-depth explainer on Keyhive’s underlying Key Encapsulation Mechanism BeeKEM, which is a decentralized offshoot of TreeKEM used in MLS: http://meri.garden/a-deep-dive-explainer-on-beekem-protocol/
dannyobrien 19 hours ago [-]
Thank you for writing this -- it clarified a lot for me in the original piece!
Too 1 days ago [-]
Their claim that every request goes through the hot path of a central auth db is stretching the truth quite a bit. With Oauth2 you get a signed access token once from the Id Provider, then you reuse this token several times until it’s given expiry time has run out. It is up to the resource server to validate the token scope, signature and the expiry time. This can be done offline as long as the resource server has the public key of the IdP. Ssh certificates work the same way.
Obviously, now the resource server instead becomes your central guard of access, and is far from a local-first crypto based solution as they describe. Just that the way it’s pictured sounded overly dramatic.
NeutralForest 2 days ago [-]
Ink and Switch has been such a source of joy for me. I like reading their articles because they come from such a different place than what you currently see in most software (Cloud based subscriptions). Just a breath of fresh air backed by cool tech and cool people. Thanks!
ctm92 2 days ago [-]
That callout card on the top of the site really messed with my brain with it being slightly tilted
eqvinox 2 days ago [-]
Same here, plus the underlining is seriously triggering me o.O
stronglikedan 1 days ago [-]
Probably designed by a "full stack developer" instead of a designer.
Xss3 2 days ago [-]
Oh man i hate that with a passion.
Devs, why?
benchloftbrunch 2 days ago [-]
Note: this has absolutely nothing to do with the Windows registry, despite the name
chr15m 2 days ago [-]
Cool. I think you could use a CRDT (even a simple LWW structure) on top of Nostr which already works and has all of the properties you are looking for.
jakelazaroff 2 days ago [-]
Could you explain how, for people not familiar with Nostr?
chr15m 1 days ago [-]
On further review this is quite a lot further developed than what I suggested above. Sorry for the noise!
pvh 1 days ago [-]
It does indeed turn out to be a difficult and subtle problem. We've tried to balance minimizing novelty (always risky in cryptographic systems) with achieving the various security and scaling properties we're looking for. We're very lucky at Ink & Switch to be working with Brooke Zelenka on this one.
richwisdomwise 2 days ago [-]
[flagged]
Rendered at 23:56:59 GMT+0000 (Coordinated Universal Time) with Vercel.
Obviously, now the resource server instead becomes your central guard of access, and is far from a local-first crypto based solution as they describe. Just that the way it’s pictured sounded overly dramatic.
Devs, why?