<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	>
<channel>
	<title>Comments on: A proper social site for the BDSM community</title>
	<atom:link href="http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/feed/" rel="self" type="application/rss+xml" />
	<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/</link>
	<description>Moving targets for a fast crowd.</description>
	<pubDate>Tue, 05 May 2026 08:55:54 +0000</pubDate>
	<generator>http://polimedia.us</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: Mircea Popescu</title>
		<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/#comment-124279</link>
		<dc:creator>Mircea Popescu</dc:creator>
		<pubDate>Tue, 16 Jan 2018 15:59:18 +0000</pubDate>
		<guid isPermaLink="false">http://trilema.com/?p=61125#comment-124279</guid>
		<description>http://btcbase.org/log/2018-01-16#1771055</description>
		<content:encoded><![CDATA[<p><a href="http://btcbase.org/log/2018-01-16#1771055">http://btcbase.org/log/2018-01-16#1771055</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mircea Popescu</title>
		<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/#comment-117300</link>
		<dc:creator>Mircea Popescu</dc:creator>
		<pubDate>Fri, 20 May 2016 14:39:58 +0000</pubDate>
		<guid isPermaLink="false">http://trilema.com/?p=61125#comment-117300</guid>
		<description>Explain the difference between p2p and "federated server". All p2p is flexibly "federated server" necessarily, neh ?

GNUPG is a horrible pile of shit currently in the process of being rewritten by tmsr. I wouldn't want it reused ; I suspect most of the "good things" are in the same situation. If you read the logs for the past coupla years you'll see we had started from your position, and slowly discovered that no, the stack is rotten to the core, and almost everything's either entirely useless or in need of a full rewrite.</description>
		<content:encoded><![CDATA[<p>Explain the difference between p2p and "federated server". All p2p is flexibly "federated server" necessarily, neh ?</p>
<p>GNUPG is a horrible pile of shit currently in the process of being rewritten by tmsr. I wouldn't want it reused ; I suspect most of the "good things" are in the same situation. If you read the logs for the past coupla years you'll see we had started from your position, and slowly discovered that no, the stack is rotten to the core, and almost everything's either entirely useless or in need of a full rewrite.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Framedragger</title>
		<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/#comment-117298</link>
		<dc:creator>Framedragger</dc:creator>
		<pubDate>Fri, 20 May 2016 10:30:31 +0000</pubDate>
		<guid isPermaLink="false">http://trilema.com/?p=61125#comment-117298</guid>
		<description>Pardon me for being too easily excitable about these things, but maybe there really is a a point to be made when you said "the correct path is to take a decent crypto lib, a distributed-hashtable-storage thing from one of the p2p torrent tools, and make a real social media app". However, I would personally settle for some kind of federated server solution, with end-to-end encryption and RSA keypair based identities (so no (explicit, at least) trust in the server). Ideally server-to-server sync, but this can come later.

There's XMPP, there are ways to do end-to-end encrypted group chats (e.g. what open whisper systems do (mpOTR has too many unresolved flaws iirc)), etc. Not to say that this would need to stick to XMPP in some way, but, dunno, keep it simple / reuse good things. Perhaps just interface with gnupg, generate a keypair, and use gnupg for encryption/decryption/signing; and do some very simple/straightforward content GETing / POSTing. Group membership info may be stored on server. Doesn't sound too bad of an approach. If one were to demand higher integrity/authenticity promises (in regards to e.g. group membership info stored on server), one could think of employing a public ledger for this kind of stuff.</description>
		<content:encoded><![CDATA[<p>Pardon me for being too easily excitable about these things, but maybe there really is a a point to be made when you said "the correct path is to take a decent crypto lib, a distributed-hashtable-storage thing from one of the p2p torrent tools, and make a real social media app". However, I would personally settle for some kind of federated server solution, with end-to-end encryption and RSA keypair based identities (so no (explicit, at least) trust in the server). Ideally server-to-server sync, but this can come later.</p>
<p>There's XMPP, there are ways to do end-to-end encrypted group chats (e.g. what open whisper systems do (mpOTR has too many unresolved flaws iirc)), etc. Not to say that this would need to stick to XMPP in some way, but, dunno, keep it simple / reuse good things. Perhaps just interface with gnupg, generate a keypair, and use gnupg for encryption/decryption/signing; and do some very simple/straightforward content GETing / POSTing. Group membership info may be stored on server. Doesn't sound too bad of an approach. If one were to demand higher integrity/authenticity promises (in regards to e.g. group membership info stored on server), one could think of employing a public ledger for this kind of stuff.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mircea Popescu</title>
		<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/#comment-117279</link>
		<dc:creator>Mircea Popescu</dc:creator>
		<pubDate>Wed, 18 May 2016 21:12:00 +0000</pubDate>
		<guid isPermaLink="false">http://trilema.com/?p=61125#comment-117279</guid>
		<description>&gt; Yeah, maybe it does.

See, thinking about it any way you wish, the upside of using a browser (random lazy derp can just go to an url) is not really a match for the upside of using a dedicated app (you can use p2p distributed hash tables for crying out loud!).

There's just no life in this idea as originally thought out, a browser thing.

&gt; I take it you mean

That, at origin, a lot of subsequent discussion in the forum hence, refining etc. Even &lt;a href=http://btcbase.org/log/2016-05-16#1467075 &gt;yesterday&lt;/a&gt;. 

&gt; So someone is working on gossipd I take it

The person named has been awol for a while. But it's not fair to say people aren't working. Currently the cud of the thing is being chewed.</description>
		<content:encoded><![CDATA[<p>> Yeah, maybe it does.</p>
<p>See, thinking about it any way you wish, the upside of using a browser (random lazy derp can just go to an url) is not really a match for the upside of using a dedicated app (you can use p2p distributed hash tables for crying out loud!).</p>
<p>There's just no life in this idea as originally thought out, a browser thing.</p>
<p>> I take it you mean</p>
<p>That, at origin, a lot of subsequent discussion in the forum hence, refining etc. Even <a href=http://btcbase.org/log/2016-05-16#1467075 >yesterday</a>. </p>
<p>> So someone is working on gossipd I take it</p>
<p>The person named has been awol for a while. But it's not fair to say people aren't working. Currently the cud of the thing is being chewed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Framedragger</title>
		<link>http://trilema.com/2015/a-proper-social-site-for-the-bdsm-community/#comment-117277</link>
		<dc:creator>Framedragger</dc:creator>
		<pubDate>Wed, 18 May 2016 15:18:45 +0000</pubDate>
		<guid isPermaLink="false">http://trilema.com/?p=61125#comment-117277</guid>
		<description>&#62;&#62; no way to "pin" a JS resource?

&#62; Wait, what ? Admittedly I'm no javascript expert, but you could obviously shasum all the files that get loaded and have samples up for display ?

Of course, (technically) yes, however, from an actual user experience perspective, I think this "being able to shasum and compare against signed samples or whatnot" feature is not as useful as you may think it may be: if there is no way for the *browser* to pin a resource (which essentially means "trust the server first time I load the page, hash this thing and then alert user if hash has changed, and do not execute automatically in that case"), it's still dangerous. Consider that (by virtue of the whole browser stack being so fucked) when you open a page with JS in it, you're kind of "installing" and running a new app every time you load it.

If I go to a page and my browser (being the steaming pile of shit that it is) automatically runs all it cans (seriously: did you know that browsers may attempt to eval() a file if file type is unknown, *hoping* it may be JS (and doing their discovery process this way)?? - see bashing by one James Mickens, systems engineer: http://scholar.harvard.edu/files/mickens/files/towashitallaway.pdf ), it's sort of useless if I later discover that, wait, shasum mismatch, I just executed shitty JS code. Now, I can make my browser not do that (auto execute), but I don't want to manually compare checksums every time I load a page, either.

Can check on browser extensions etc etc, but the point is, it's nice if you can tell the browser to only trust this particular version of the file, and warn you *before* it gets any funny ideas of executing it - just that. W3C appears to have standardized such enforced resource pinning. Using this in addition to samples, and say, a nice signed message with hashes in it may be enough. (But if you run an older browser which doesn't give a fuck what it's served, god help you! But then it's your fault anyway, so.)

&#62; gossipd

Yeah, maybe it does. I take it you mean http://trilema.com/2015/artifexd-a-better-ircd-rfc/ - interesting proposal. I wonder if you'd still think doing a JS version of the social site to be worth it? I stumbled upon this particular post sort of accidentally, after looking for frontend-based discussion board implementations. I'd imagine an implementation for a more generic public key + encrypted blob system, with such a BDSM community social site being a further customization of that system. Having the latter in decent less-shitty form would surely be nice.

&#62; The 35 exponent.

Hah, oops, well fuck. Gonna check it (Phuctor and its findings) in more detail, this is entertaining!

&#62; Cramer–Shoup

Aha. RSA seems the way to go as of now, then.

&#62; RNG in JS

Yeah, fuck that shit. Web crypto API (standardized browser API) may be the way to go here (https://developer.mozilla.org/en-US/docs/Web/API/RandomSource/getRandomValues e.g.), but it still feels dirty.

&#62;&#62; Symmetrically encrypt local cookie data with a passphrase stored on the server

&#62; So you've just de-rsa'd it.

Yeahyeah, this breaks the initial idea. (Private key would still not be handed to the server, note; but this would have implications for dependence on particular server as well as some form of legal deniability on the server's part...)

Re. all else, gotcha. So someone is working on gossipd I take it - interesting.

I'd still like to implement this. I don't know - maybe doing all of the above in the browser *is* futile and prone to disaster. Possibly it's still a worthy idea, I think.

May have further follow-up points later on.</description>
		<content:encoded><![CDATA[<p>&gt;&gt; no way to "pin" a JS resource?</p>
<p>&gt; Wait, what ? Admittedly I'm no javascript expert, but you could obviously shasum all the files that get loaded and have samples up for display ?</p>
<p>Of course, (technically) yes, however, from an actual user experience perspective, I think this "being able to shasum and compare against signed samples or whatnot" feature is not as useful as you may think it may be: if there is no way for the *browser* to pin a resource (which essentially means "trust the server first time I load the page, hash this thing and then alert user if hash has changed, and do not execute automatically in that case"), it's still dangerous. Consider that (by virtue of the whole browser stack being so fucked) when you open a page with JS in it, you're kind of "installing" and running a new app every time you load it.</p>
<p>If I go to a page and my browser (being the steaming pile of shit that it is) automatically runs all it cans (seriously: did you know that browsers may attempt to eval() a file if file type is unknown, *hoping* it may be JS (and doing their discovery process this way)?? - see bashing by one James Mickens, systems engineer: <a href="http://scholar.harvard.edu/files/mickens/files/towashitallaway.pdf">http://scholar.harvard.edu/files/mickens/files/towashitallaway.pdf</a> ), it's sort of useless if I later discover that, wait, shasum mismatch, I just executed shitty JS code. Now, I can make my browser not do that (auto execute), but I don't want to manually compare checksums every time I load a page, either.</p>
<p>Can check on browser extensions etc etc, but the point is, it's nice if you can tell the browser to only trust this particular version of the file, and warn you *before* it gets any funny ideas of executing it - just that. W3C appears to have standardized such enforced resource pinning. Using this in addition to samples, and say, a nice signed message with hashes in it may be enough. (But if you run an older browser which doesn't give a fuck what it's served, god help you! But then it's your fault anyway, so.)</p>
<p>&gt; gossipd</p>
<p>Yeah, maybe it does. I take it you mean <a href="http://trilema.com/2015/artifexd-a-better-ircd-rfc/">http://trilema.com/2015/artifexd-a-better-ircd-rfc/</a> - interesting proposal. I wonder if you'd still think doing a JS version of the social site to be worth it? I stumbled upon this particular post sort of accidentally, after looking for frontend-based discussion board implementations. I'd imagine an implementation for a more generic public key + encrypted blob system, with such a BDSM community social site being a further customization of that system. Having the latter in decent less-shitty form would surely be nice.</p>
<p>&gt; The 35 exponent.</p>
<p>Hah, oops, well fuck. Gonna check it (Phuctor and its findings) in more detail, this is entertaining!</p>
<p>&gt; Cramer–Shoup</p>
<p>Aha. RSA seems the way to go as of now, then.</p>
<p>&gt; RNG in JS</p>
<p>Yeah, fuck that shit. Web crypto API (standardized browser API) may be the way to go here (https://developer.mozilla.org/en-US/docs/Web/API/RandomSource/getRandomValues e.g.), but it still feels dirty.</p>
<p>&gt;&gt; Symmetrically encrypt local cookie data with a passphrase stored on the server</p>
<p>&gt; So you've just de-rsa'd it.</p>
<p>Yeahyeah, this breaks the initial idea. (Private key would still not be handed to the server, note; but this would have implications for dependence on particular server as well as some form of legal deniability on the server's part...)</p>
<p>Re. all else, gotcha. So someone is working on gossipd I take it - interesting.</p>
<p>I'd still like to implement this. I don't know - maybe doing all of the above in the browser *is* futile and prone to disaster. Possibly it's still a worthy idea, I think.</p>
<p>May have further follow-up points later on.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
