Categories
Uncategorized

Talking about #hashtags

We need to think of a serendipity view of how #hashtags work and how our coder kings implement them (#feudalism). Not saying this is a good aproch… i don’t know… but spelling hashtags “wrong” makes their use in categorization and sorting work differently. Might be worth thinking if this could add value or is purely negative? This depends on different views on federation and ideas of a universal truth or messy “truths”. Composting thought on this.

In the #OMN coding project, currently offline (unite.openworlds.info) we add word grouping flows, so you can say one hashtag is the same as another, ie. you can group different “meanings” to build category flows. This makes misspelled hashtags functional, and our current coding broken from the #OMN point of view.

It’s not implemented, is a speck projects so can’t test this. Over the last year I have put 5 #FOSS funding applications in to try and get this built, 3 turned down so far 2 more to be turned down (cross fingers and toes not) soon. Our #AP #openweb reboot is being destroyed by our #fahernistas and #geekproblem nothing new here, but we do need to do better.

That’s what we set out to fix 20 years ago, with the #OMN still digging, but my shovel has no handeal nor a head… says the man on his knees hands covered in shit… composting worthwhile however you do it, I could not make this shit up… but we keep making more #techshit

Categories
Uncategorized

Meta and the mess

#FOSS governance is based on #feudalism  the thing you learn from history is to never trust a king.

#meta and the messy path we are going down, Libertarian cats are completely pointless at this stage of mess, anyone got a plan?

#OGB #OMN #indymediaback

Categories
Uncategorized

Why is Mastodon so dominant in the fediverse?

Q. Why is Mastodon so dominant in the fediverse?

A. It had better #UX and @Gargron running it was an effective communicator at #KISS and built it out as a project alongside a healthy (white) lie about security and privacy.
The rest of the projects lacked these things – #Pleroma the obverse compaine was ripped apart by the #geekproblem then embraced by the right-wing. #Peertube was stuck in a good but closed development for years. #Pixelfed is a little brother project to #mastodon. Then there are a whole flood of #NGO funded projects that have no community.

Might be useful to see it as we’re having a “KING” problem, then the rest are #feudalism all the way down. This should be easy to fix as its and all #openweb, but it’s not. Just about everyone is hard #BLOCKING the obvuse need for “democracy” as a path out of the mess #OGB

How is the #NOSTR world doing on this?

Categories
Uncategorized

Talking about trust and power in networks

A. on the subject of “security” we have a #open policy of not trusting ANY client server security at all, so this should only be done as far as possible and having limited trust in #p2p security, even though we use this, because of the insecurity of the underlighting syteams it runs on, mostly old outdated phones, built as blobs by #dotcons this simple approach gets round much of the current thinking of technical “security” ie. the is almost non at a normal use level and little real security at the paranoid level as you will be talking to the normal level so there security will fail even if yours is solid. good to keep this in mind 🙂

The #OMN is all about people messing around with each others data 😉 but yes we need good basic security, (sudo anomumus) accounts, public audit trails (openprocess) everywhere. we will need digital hashes/cigs for media items etc. but the data it self just sloshes around and gets hacked at and added to. its a commons, the rules are social based on trust flows, they are not mostly hard coded or encrypted. but we add a smidgen of hardcoding and decryption ONLY were its needed. So 90% trust flows, 5% social norms, 4% hardcoded, 1% encryption is my thinking.

A. Data has the value the instance itself is transitory, and yes the instance is needed and stores the data but if it vanishes it has little impact on the value (the data), we build this into the network.

Q. am talking about the machines

A. We won’t the instance to stay up and be secure, BUT we build the network, so it keeps working when they are hacked and poisend by bad actors.

Q. Yes, but that doesn’t mean we make things easy for bad actors

A. Yes, the code and instances have to be secure, but the network flows, and the data soup have to keep working when the individual instances are hacked and poised, no security is fool prof and the #OMN is focused on building trust so is inherently more open to fools, we build with this in mind. We are building a #KISS semantic internet of data/flows. For example the idea of rollback as a core security model rather than more traditional hard (control) security is a good fit, due to the approach, the missing few days of data will (mostly) rollback into the instance so the cost of being hacked/trust failed is less of a block to being open and (social) trusting to bring in actors/sysadmins/moderates etc. On the tin, we are clear that our network is a trust based “lossy” network.

Where you can still run the #OMN as a hard control based secure network if you wont BUT it will not scale to the social change/challenge if this second option is the only one, this is the current #geekproblem we need to work our way out of. The first path of trust based “lossy” is where the real horizontal “power” comes from.

Q. We sometimes need to think/talk about “security”.

A. I can only repeat I don’t have a solution to this, but I have a path to one, make the user facing “trust” based then from this, “trust” them to fix the next “problem” the #geekproblem of the hardcoded #feudalism of all our networks and code. Or in other words head in sand and pray someone else will fix it, am bussey 😉

On the #OMN projects maybe we need to list what needs to be secure: the account, the activity feed, the data credit might be more but can’t think of much else off the top of my head. And yes to secure the account the instance has to be secure, to secure the activity feed the flows need to be secure, to secure the credit the likely needs to be some hashing done on the media objects.
We likely end up back close to the place we started, but we come to this from a very different place, if that makes sense. This path we take matters.