@kaniini The "users may not see it" if the ocap ux is done right is a very intentional statement; one of the main problems that the ScoopFS people described is that the users were used to being inconvenienced by security so much that when the workflow was so straightforward they asked, "But how do I turn on the security?"
Eva is deciding about whether to hire Alice as a sysadmin; in making that decision, she's reasoning about Alice's identity. Once hires her, she hands Alice an ocap. The *system* does not care who has that ocap upon any invocation, just whether it is valid, but it does log for Eva's information that the ocap being used is the one given to Alice. If Eva sees Alice misuses it, she revokes that ocap.
@kaniini "Reasoning about identity" and ocaps is a bit like side-effects and haskell. Haskell technically needs to work *with* side effects, or its programs would be unable to do anything interacting with the outside world. Similarly, ocaps need a starting and ending place for identity. The way haskell solves this is through the IO monad; it is like a beautiful city of computation, but a truck drives in from one side of the city with input and out the other side of the city with output (cotd)
@kaniini There will always be a trust assertion indeed.
But it's important to recognize where the trust assertion shifts with ocaps; the identity of the peer within the *ocap component* is not checked at the time of receipt. However, through allowing for revocation and accountability, we have a mechanism that composes with the ocap stuff to reason about identity (but we do not make a "value judgement" in the ocap infrastructure, we leave tools so our users can do that)
Eva is deciding about whether to hire Alice as a sysadmin; in making that decision, she's reasoning about Alice's identity. Once hires her, she hands Alice an ocap. The *system* does not care who has that ocap upon any invocation, just whether it is valid, but it does log for Eva's information that the ocap being used is the one given to Alice. If Eva sees Alice misuses it, she revokes that ocap.
@kaniini "Reasoning about identity" and ocaps is a bit like side-effects and haskell. Haskell technically needs to work *with* side effects, or its programs would be unable to do anything interacting with the outside world. Similarly, ocaps need a starting and ending place for identity. The way haskell solves this is through the IO monad; it is like a beautiful city of computation, but a truck drives in from one side of the city with input and out the other side of the city with output (cotd)
@kaniini There will always be a trust assertion indeed.
But it's important to recognize where the trust assertion shifts with ocaps; the identity of the peer within the *ocap component* is not checked at the time of receipt. However, through allowing for revocation and accountability, we have a mechanism that composes with the ocap stuff to reason about identity (but we do not make a "value judgement" in the ocap infrastructure, we leave tools so our users can do that)
@aeva I should note that it's not really a MRE... it's more of a Meal Almost Ready to Eat (a MaRE?) since you have to add hot water to it and wait a few minutes, as opposed to just ripping open a foil pouch!
Why is it that I have no trouble reading and examining contract language, and even kind of enjoy it, but *filling out and signing* contracts or forms is a source of enormous anxiety for me?
(Luckily @mlemweb has the opposite stressors, so we can work together on such things.)