Skip to content
  • Categories
  • World
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Zephyr)
  • No Skin
Collapse
Brand Logo

The Nexus of Discussions

  1. Home
  2. Categories
  3. Uncategorized
  4. The fedi discourse on Bluesky's verification is just depressing.

The fedi discourse on Bluesky's verification is just depressing.

Scheduled Pinned Locked Moved Uncategorized
blueskyverificationfediverse
10 Posts 3 Posters 22 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
    thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
    thenexusofprivacy@infosec.exchange
    wrote last edited by thenexusofprivacy@infosec.exchange
    #1

    The fedi discourse on Bluesky's verification is very frustrating Don't et me wrong, there's a lot to critique with Bluesky's approach of combining their own platform-level verification with initially annointing a handful of third-party verifiers:

    • community-oriented verification, along the lines that @rudyfraser.com suggests, would be much more power-distributive and equitable

    • as @ngerakines.me notes, Bluesky's approach is missing something critical: consent

    • as @DataDrivenMD points out, the current framework functionally disenfranchises community organizers who lack social networks with access to mainstream media and other institutions that are designed to exclude marginalized people

    • just like on Twitter, he people initially verified are overwhelmingly cis, white, and male;

    • the three initial external verifiers include the anti-trans NYTimes and one of their subsidiaries

    • Bluesky hasn't said anything about their process for making decisions about who's "notable" enough for them to verify and how they decide somebody's "authentic".

    To be fair, I am seeing a bit of discussion of some of these issues here. But I'm not seeing anything about consent, or community moderation, or equity. Instead, the vast majority of what I'm seeing is people saying hat the approach of external verifiers (run by entities other than Bluesky) and the Bluesky app attaching privileged semantics to the annointed ones isn't "decentraized."

    Is that really the important thing here?

    #bluesky #verification #fediverse

    thenexusofprivacy@infosec.exchangeT khurtwilliams@indieweb.socialK 2 Replies Last reply
    • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

      The fedi discourse on Bluesky's verification is very frustrating Don't et me wrong, there's a lot to critique with Bluesky's approach of combining their own platform-level verification with initially annointing a handful of third-party verifiers:

      • community-oriented verification, along the lines that @rudyfraser.com suggests, would be much more power-distributive and equitable

      • as @ngerakines.me notes, Bluesky's approach is missing something critical: consent

      • as @DataDrivenMD points out, the current framework functionally disenfranchises community organizers who lack social networks with access to mainstream media and other institutions that are designed to exclude marginalized people

      • just like on Twitter, he people initially verified are overwhelmingly cis, white, and male;

      • the three initial external verifiers include the anti-trans NYTimes and one of their subsidiaries

      • Bluesky hasn't said anything about their process for making decisions about who's "notable" enough for them to verify and how they decide somebody's "authentic".

      To be fair, I am seeing a bit of discussion of some of these issues here. But I'm not seeing anything about consent, or community moderation, or equity. Instead, the vast majority of what I'm seeing is people saying hat the approach of external verifiers (run by entities other than Bluesky) and the Bluesky app attaching privileged semantics to the annointed ones isn't "decentraized."

      Is that really the important thing here?

      #bluesky #verification #fediverse

      thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
      thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
      thenexusofprivacy@infosec.exchange
      wrote last edited by thenexusofprivacy@infosec.exchange
      #2

      And here's another example. ‪Frank Hecker discussed he analogy between Bluesky's approach and certificate authorities (CAs) in browsers on Bluesky; so did @cwebber here on fedi. Good points by both! But ...

      The Bluesky discussion included discussions of verification as a security measure (and the risks of ad hoc security functionality), power dynamics, and other possible approaches like petnames, Trust over IP, using DV/IV/OV/EV SSL certificates, and other interesting topics.

      The fedi discussion was almost completely developers discussing situations where people overrode the browser's (or OS's) list of root CA's. Is that really the key point here?

      Again, don't get me wrong: the point Christine is making in the original post is a good one -- my frustration relates to where the discussion went from there. I'd use somewhat different language than Christine (since Bluesky's initial implementation does involve mutliple independently-run verifiers I'd consider it at least somewhat decentralized, but power centralizing) but that's not the important thing here. I certainly agree that this implementation approach very much fits the pattern of Bluesky introducing something that's architecturally decentralized but initially almost completely centralized operationally, with vague plans for more future operational decentralization and no discussion of pwer dynamics. Like I say, there's a lot to critique here!

      But there's also a lot to learn, and at least from the discussions I'm seeing on fedi, people are generally taking a pass on the learning opportunities.

      cwebber@social.coopC thenexusofprivacy@infosec.exchangeT 3 Replies Last reply
      • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

        The fedi discourse on Bluesky's verification is very frustrating Don't et me wrong, there's a lot to critique with Bluesky's approach of combining their own platform-level verification with initially annointing a handful of third-party verifiers:

        • community-oriented verification, along the lines that @rudyfraser.com suggests, would be much more power-distributive and equitable

        • as @ngerakines.me notes, Bluesky's approach is missing something critical: consent

        • as @DataDrivenMD points out, the current framework functionally disenfranchises community organizers who lack social networks with access to mainstream media and other institutions that are designed to exclude marginalized people

        • just like on Twitter, he people initially verified are overwhelmingly cis, white, and male;

        • the three initial external verifiers include the anti-trans NYTimes and one of their subsidiaries

        • Bluesky hasn't said anything about their process for making decisions about who's "notable" enough for them to verify and how they decide somebody's "authentic".

        To be fair, I am seeing a bit of discussion of some of these issues here. But I'm not seeing anything about consent, or community moderation, or equity. Instead, the vast majority of what I'm seeing is people saying hat the approach of external verifiers (run by entities other than Bluesky) and the Bluesky app attaching privileged semantics to the annointed ones isn't "decentraized."

        Is that really the important thing here?

        #bluesky #verification #fediverse

        khurtwilliams@indieweb.socialK This user is from outside of this forum
        khurtwilliams@indieweb.socialK This user is from outside of this forum
        khurtwilliams@indieweb.social
        wrote last edited by
        #3

        @thenexusofprivacy @rudyfraser.com @ngerakines.me @DataDrivenMD

        Did the Self-Verification via DNS thing on Bluesky months ago—@islandinthenet.com. Before the new blue checks.

        Anyone with a domain can do this.

        thenexusofprivacy@infosec.exchangeT 1 Reply Last reply
        • khurtwilliams@indieweb.socialK khurtwilliams@indieweb.social

          @thenexusofprivacy @rudyfraser.com @ngerakines.me @DataDrivenMD

          Did the Self-Verification via DNS thing on Bluesky months ago—@islandinthenet.com. Before the new blue checks.

          Anyone with a domain can do this.

          thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
          thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
          thenexusofprivacy@infosec.exchange
          wrote last edited by
          #4

          @khurtwilliams Sure, I did it too - @thenexusofprivacy.net. But a lot of people don't have domains, and it's easy enough to set up a real-looking domain for an individual account as part of impersonation, so it's useful to have other mechanisms as well.

          khurtwilliams@indieweb.socialK 1 Reply Last reply
          • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

            @khurtwilliams Sure, I did it too - @thenexusofprivacy.net. But a lot of people don't have domains, and it's easy enough to set up a real-looking domain for an individual account as part of impersonation, so it's useful to have other mechanisms as well.

            khurtwilliams@indieweb.socialK This user is from outside of this forum
            khurtwilliams@indieweb.socialK This user is from outside of this forum
            khurtwilliams@indieweb.social
            wrote last edited by
            #5

            @thenexusofprivacy @thenexusofprivacy.net I hear you—and you make a valid point. Not everyone has a domain, and yes, domains can be faked. But I think it's worth asking: what would a better approach look like?

            What kind of verification could Bluesky offer that’s fair, accessible, and still resistant to impersonation?

            I’d love to see more focus on that kind of constructive thinking. It’s easy to spot flaws, harder (but more rewarding) to help shape solutions.

            thenexusofprivacy@infosec.exchangeT 1 Reply Last reply
            • khurtwilliams@indieweb.socialK khurtwilliams@indieweb.social

              @thenexusofprivacy @thenexusofprivacy.net I hear you—and you make a valid point. Not everyone has a domain, and yes, domains can be faked. But I think it's worth asking: what would a better approach look like?

              What kind of verification could Bluesky offer that’s fair, accessible, and still resistant to impersonation?

              I’d love to see more focus on that kind of constructive thinking. It’s easy to spot flaws, harder (but more rewarding) to help shape solutions.

              thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
              thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
              thenexusofprivacy@infosec.exchange
              wrote last edited by thenexusofprivacy@infosec.exchange
              #6

              @khurtwilliams Yeah, agreed that it's useful to focus on a better approach -- and not just for Bluesky, for the fediverse too! I think Rudy's suggestion (the first bullet of myoriginal post) of community verifiers is a promising direction. On fedi, I could see synergies between that kind of approach and and fedifams / caracoles.

              And also I think that @zicklag's thread at https://bsky.app/profile/zicklag.dev/post/3lnfuc7udjl24 points to interesting directions. And there's also been some discussion of web-of-trust based approaches, that could be intersting to explore.

              1 Reply Last reply
              • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

                And here's another example. ‪Frank Hecker discussed he analogy between Bluesky's approach and certificate authorities (CAs) in browsers on Bluesky; so did @cwebber here on fedi. Good points by both! But ...

                The Bluesky discussion included discussions of verification as a security measure (and the risks of ad hoc security functionality), power dynamics, and other possible approaches like petnames, Trust over IP, using DV/IV/OV/EV SSL certificates, and other interesting topics.

                The fedi discussion was almost completely developers discussing situations where people overrode the browser's (or OS's) list of root CA's. Is that really the key point here?

                Again, don't get me wrong: the point Christine is making in the original post is a good one -- my frustration relates to where the discussion went from there. I'd use somewhat different language than Christine (since Bluesky's initial implementation does involve mutliple independently-run verifiers I'd consider it at least somewhat decentralized, but power centralizing) but that's not the important thing here. I certainly agree that this implementation approach very much fits the pattern of Bluesky introducing something that's architecturally decentralized but initially almost completely centralized operationally, with vague plans for more future operational decentralization and no discussion of pwer dynamics. Like I say, there's a lot to critique here!

                But there's also a lot to learn, and at least from the discussions I'm seeing on fedi, people are generally taking a pass on the learning opportunities.

                cwebber@social.coopC This user is from outside of this forum
                cwebber@social.coopC This user is from outside of this forum
                cwebber@social.coop
                wrote last edited by
                #7

                @thenexusofprivacy You're right that the original post discussed those other things, and maybe I should have highlighted that.

                Still, I don't think the "mulitple verifiers" changes much in the analysis of whether it resembles CAs: browsers also ship with multiple certificate authorities, which each act like verifiers in this case.

                thenexusofprivacy@infosec.exchangeT 1 Reply Last reply
                • cwebber@social.coopC cwebber@social.coop

                  @thenexusofprivacy You're right that the original post discussed those other things, and maybe I should have highlighted that.

                  Still, I don't think the "mulitple verifiers" changes much in the analysis of whether it resembles CAs: browsers also ship with multiple certificate authorities, which each act like verifiers in this case.

                  thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                  thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                  thenexusofprivacy@infosec.exchange
                  wrote last edited by
                  #8

                  @cwebber agreed that it doesn't change things. And, I wasn't criticizing your original post (or at least didn't mean to). I thought your question drove the point home very nicely about the limits in practice about providing multiple annointed roots and a way people can extend it! It was really the replies that caught my attention there.

                  1 Reply Last reply
                  • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

                    And here's another example. ‪Frank Hecker discussed he analogy between Bluesky's approach and certificate authorities (CAs) in browsers on Bluesky; so did @cwebber here on fedi. Good points by both! But ...

                    The Bluesky discussion included discussions of verification as a security measure (and the risks of ad hoc security functionality), power dynamics, and other possible approaches like petnames, Trust over IP, using DV/IV/OV/EV SSL certificates, and other interesting topics.

                    The fedi discussion was almost completely developers discussing situations where people overrode the browser's (or OS's) list of root CA's. Is that really the key point here?

                    Again, don't get me wrong: the point Christine is making in the original post is a good one -- my frustration relates to where the discussion went from there. I'd use somewhat different language than Christine (since Bluesky's initial implementation does involve mutliple independently-run verifiers I'd consider it at least somewhat decentralized, but power centralizing) but that's not the important thing here. I certainly agree that this implementation approach very much fits the pattern of Bluesky introducing something that's architecturally decentralized but initially almost completely centralized operationally, with vague plans for more future operational decentralization and no discussion of pwer dynamics. Like I say, there's a lot to critique here!

                    But there's also a lot to learn, and at least from the discussions I'm seeing on fedi, people are generally taking a pass on the learning opportunities.

                    thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                    thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                    thenexusofprivacy@infosec.exchange
                    wrote last edited by
                    #9
                    This post is deleted!
                    1 Reply Last reply
                    • thenexusofprivacy@infosec.exchangeT thenexusofprivacy@infosec.exchange

                      And here's another example. ‪Frank Hecker discussed he analogy between Bluesky's approach and certificate authorities (CAs) in browsers on Bluesky; so did @cwebber here on fedi. Good points by both! But ...

                      The Bluesky discussion included discussions of verification as a security measure (and the risks of ad hoc security functionality), power dynamics, and other possible approaches like petnames, Trust over IP, using DV/IV/OV/EV SSL certificates, and other interesting topics.

                      The fedi discussion was almost completely developers discussing situations where people overrode the browser's (or OS's) list of root CA's. Is that really the key point here?

                      Again, don't get me wrong: the point Christine is making in the original post is a good one -- my frustration relates to where the discussion went from there. I'd use somewhat different language than Christine (since Bluesky's initial implementation does involve mutliple independently-run verifiers I'd consider it at least somewhat decentralized, but power centralizing) but that's not the important thing here. I certainly agree that this implementation approach very much fits the pattern of Bluesky introducing something that's architecturally decentralized but initially almost completely centralized operationally, with vague plans for more future operational decentralization and no discussion of pwer dynamics. Like I say, there's a lot to critique here!

                      But there's also a lot to learn, and at least from the discussions I'm seeing on fedi, people are generally taking a pass on the learning opportunities.

                      thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                      thenexusofprivacy@infosec.exchangeT This user is from outside of this forum
                      thenexusofprivacy@infosec.exchange
                      wrote last edited by
                      #10

                      An interesting followon to the Bluesky verification discussion I haven't seen discussion of over here: @aviva.gay introduced the ability for users to appoint their own "Trusted Verifiers" to their bluesky alt client, deer.social

                      OK, relatively few people adopt alternate clients, so this doesn't immediately help everybody (just like phanpy's UI doesn't help the vast majority of people who run the official Mastodon apps and don't even know about the alterantives). Still, it's a signficiant development, and there's a lot to learn.

                      Speaking of a lot to learn, here's a very good thread about Trusted Networks and how it relates to "verification" -- so I wanted to add it here as well. https://bsky.app/profile/rhalin.bsky.social

                      #bluesky

                      1 Reply Last reply
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      Please keep the community guidelines in mind!
                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • World
                      • Recent
                      • Tags
                      • Popular
                      • Users
                      • Groups