Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Annah (maiyannah@community.highlandarrow.com)'s status on Sunday, 27-May-2018 09:19:29 EDT Annah Annah
    With key based identity it wouldn't be too difficult to rule out impersonation cases, I shouldn't think.
    In conversation Sunday, 27-May-2018 09:19:29 EDT from community.highlandarrow.com permalink
    1. Annah (maiyannah@community.highlandarrow.com)'s status on Sunday, 27-May-2018 09:21:28 EDT Annah Annah
      in reply to
      Key-based identity is probably the most intrusive change to the codebase I plan to introduce.  When I do introduce it is probably going to be when postActiv diverges enough from the GNU social codebase we won't easily be able to import changes in upstream (not that this is probably a concern anyways, it kind of uh, seems pretty abandoned now)
      In conversation Sunday, 27-May-2018 09:21:28 EDT from community.highlandarrow.com permalink
    2. Verius (verius@community.highlandarrow.com)'s status on Sunday, 27-May-2018 09:21:56 EDT Verius Verius
      in reply to
      @maiyannah You mean like with public key signatures? Yeah, it would make that pretty hard. Even a system where all the private key stuff happens on server would at least limit the ability to impersonate to just the people with admin level access.
      In conversation Sunday, 27-May-2018 09:21:56 EDT from community.highlandarrow.com permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.