shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

255
active users

#keyoxide

0 posts0 participants0 posts today
Replied in thread

@mapache @badgefed@vocalcat.com @badgefed@badges.vocalcat.com @julian

Okay, okay then 😜

Inspired by @dajb I will use 'Social verifiable credentials' as the category for #BadgeFed in the new taxonomy I am creating for delightful-fediverse-apps curated list. Which I am in the process of giving a complete makeover and revitalization. Hope to have it live soon

delightful.coding.social/delig

PS. Was also talking badges & credentials with @RyunoKi today, regarding #Keyoxide roadmap.

delightful.coding.socialdelightful fediverse appsDelightful curated lists of free software, open science and information sources.
Replied to 100%/0% TAX ✅ ✅

@shoppingtonz @a @keyoxide #keyoxide

A ha! I think I've found the problem. I created a test ASP profile on keyoxide with just this mastodon account as the claimed identity, done two different ways:

keyoxide.org/aspe:keyoxide.org

The first way is the standard way of adding a claim to the ASP profile, by selecting the dropdown of "Mastodon" and putting in your username. This produces a `rel="me"` URL on the profile page that looks like this:

<a rel="me" href="tenforward.social/@aspensmonst" aria-label="link to profile">tenforward.social/@aspensmonst</a>

This follows the exact format that Mastodon docs say they are looking for in a verification link, and the Mastodon client will respect this and show the link as verified (see my "Keyoxide ASP" metadata block on my profile for proof).

However, if instead of "Mastodon" in the claim creation dropdown I pick "Manual input", and then put in a link to a specific *post* on my account as the claim, then the generated URL is instead:

<a rel="me" href="tenforward.social/users/aspens" aria-label="link to profile">tenforward.social/users/aspens</a>

Notice how instead of `$instance/@$user`, the format is `$instance/users/$user`. Since this is not what Mastodon expects the format of the verification URL to be, it does not show the URL as verified.

I believe that the `/users/` approach is a more general activitypub approach, and is probably more "AP standard." However, Mastodon specifically doesn't seem to consider that as equivalent.

Three options:

1. Mastodon accepts the /users/ approach and considers the link verified (probably won't happen)
2. Keyoxide tries to determine if the specific AP implementation is Mastodon, and tweaks the URL to be in the expected format (not ideal)
3. Have ASP users only use profile claims and not post claims for Mastodon if they want Mastodon's green checkmark (easiest).

For @shoppingtonz , the easiest thing for you to do would be to remove the post claim that you have on your ASP profile, and use the standard "Mastodon" dropdown instead. Then, the green verification bar and check should work for you too.

keyoxide.orgTest Profile - KeyoxideModern and secure platform to manage a decentralized identity based on cryptographic keys
Replied in thread

@Xeniax Totally nerdsniped :D I'd love to be a part of the study.

I don't think that #KeyServers are dead. I think they evolved into Verifying Key Servers (VKS), like the one run by a few folks from the OpenPGP ecosystem at keys.openpgp.org/about . More generally, I believe that #PGP / #GPG / #OpenPGP retains important use-cases where accountability is prioritized, as contrasted with ecosystems (like #Matrix, #SignalMessenger) where deniability (and Perfect Forward Secrecy generally) is prioritized. Further, PGP can still serve to bootstrap those other ecosystems by way of signature notations (see the #KeyOxide project).

Ultimately, the needs of asynchronous and synchronous cryptographic systems are, at certain design points, mutually exclusive (in my amateur estimation, anyway). I don't think that implies that email encryption is somehow a dead-end or pointless. Email merely, by virtue of being an asynchronous protocol, cannot meaningfully offer PFS (or can it? Some smart people over at crypto.stackexchange.com seem to think there might be papers floating around that can get at it: crypto.stackexchange.com/quest).

To me, the killer feature of PGP is actually not encryption per se. It's certification, signatures, and authentication/authorization. I'm more concerned with "so-and-so definitely said/attested to this" than "i need to keep what so-and-so said strictly private/confidential forever and ever." What smaller countries like Croatia have done with #PKI leaves me green with envy.

keys.openpgp.orgkeys.openpgp.org

#gpg key expirations have been updated for another two-year bump. I also removed #twitter / X signature notation (I've deleted my account there), and added a bunch of other signature notations for other places I am online. It's making my #keyoxide page look dirty, but I intend to try and add support for as many of these as possible in the next few months.

Also, I updated my #tails #TailsOS installation while I was at it. I do most of my GPG key work from that environment.

Replied in thread

@hyperreal From having implemented a #keyoxide claim verification service once, I can say that IRC and XMPP were far and away the most flaky endpoints to talk to, followed by Matrix. Ultimately, chat programs aren't really optimized for constantly serving up old messages at random (what Matrix claim verification does IIRC) and bots aren't always well-behaved (what IRC claim verification does IIRC). XMPP at least has the concept of storing non-message data (from some XEP or another; can't remember which) though.

Keyoxidizer: the GPG helper script for @keyoxide identity proofs now makes it easy to add identity proofs for some of the platforms supported, contributions welcome!

Help us get all ☑️s in all the places and contribute wherever you're comfortable:
github.com/shombando/keyoxidiz
codeberg.org/shom/keyoxidizer
git.sr.ht/~shom/keyoxidizer

edit: updated to use ed25519 curve, please update and make new keys for security and performance benefits.

GitHubGitHub - shombando/keyoxidizer: Keyoxidizer - Interactive Keyoxide helperKeyoxidizer - Interactive Keyoxide helper. Contribute to shombando/keyoxidizer development by creating an account on GitHub.

Today I added so-called #verification to my Mastodon profile using #keyoxide. I didn't really know what I was getting into when I got started, but I made it work! And learned a lot in the process.

I haven't seen a lot of folks describe this process, so here were the basic steps I followed.

(Note: if the command line frightens you, you're probably better off putting code in an existing website as described in the Preferences menu. But if you want a nerdier challenge like I did, read on!)