55 Matching Annotations
  1. Sep 2024
    1. This means that computer does not impose one particular service rather than another, or one protocol rather than another. It does not require the user to get anyone else's permission to communicate via a certain protocol.
    2. The computer will communicate, without prejudice, through whatever protocol your installed software implements, with whatever users and whatever other networked computers you direct it to communicate with.
  2. Jul 2024
    1. There’s a generational divide here. Brilliant coders now on the market or in the free software space have never known a world without Google, Facebook and Github. Their definition of software is "something running in the browser". Even email is, for them, a synonym for the proprietary messaging system called "Gmail" or "Outlook". They contribute to FLOSS on Github while chatting on Slack or Discord, sharing specifications on Google Drive and advertising their project on Twitter/X. They also often have an iPhone and a Mac because "shiny". They cannot imagine an alternative world where monopolies would not be everywhere. They feel that having nice Github and Linkedin profiles where they work for free is the only hope they have to escape unemployment.

      Also relates to non-coding humans using ICT in their everyday.

  3. Apr 2024
  4. Aug 2023
  5. Jun 2023
    1. The big promise of federated social tools is neither Mastodon (or Calckey or any of the other things I’ve seen yet) nor the single-server Bluesky beta—it’s new things built in new ways that use protocols like AT and ActivityPub to interact with the big world.

      Vgl [[Build protocols not platforms 20190821202019]] I agree. Kissane says use protocols in new ways for new tools, starting from the premise of actually social software.

  6. May 2023
  7. Mar 2023
    1. Protocols are, by their very nature, open. If you can't read the protocol specification then you can't very well implement it, can you?
    2. As others pointed out, OATH's claims of "open source" have little meaning when compared to other authentication protocols such as SAML. When you include the entire Liberty Alliance specifications as well as the Web Services Initiative protocols and methods (as devised by Microsoft and IBM) there's nary a proprietary bit of code involved. Actually, there's no code involved at all. Protocols are, by their very nature, open. If you can't read the protocol specification then you can't very well implement it, can you?
  8. Jan 2023
  9. Nov 2022
    1. Nowhere better to start getting one’s head around this distributed vision than with Mike Masnick’s epic explainer, Protocols, Not Platforms: A Technological Approach to Free Speech.

      Mike Masnick https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech Aug 2019. n:: "Build protocols, not platforms" (reminds me of the convo's around Jabber/XMPP I listened into in the early '00s) Also, IndieWeb / ActivityPub

  10. Aug 2022
    1. By nature of running on a blockchain, Hyperstructures can run forever with no ability to stop them. They can continuously function without a maintainer or operator, and they can run for as long as the underlying blockchain is running

      Seems to me that the same can be said of internet protocols, which are unstoppable as long as the internet is running. Where's the difference? Also, the equation of "forever" with "at least a decade" is funny.

  11. May 2022
  12. Apr 2022
    1. Feature request (implement something that allows the following): 1. From any page containing a bookmarklet, invoke the user-stored bookmarklet בB 2. Click the bookmarklet on the page that you wish to be able to edit in the Bookmarklet Creator 3. From the window that opens up, navigate to a stored version of the Bookmarklet Creator 4. Invoke bookmarklet בB a second time from within the Bookmarklet Creator

      Expected results:

      The bookmarklet from step #2 is decoded and populates the Bookmarklet Creator's input.

      To discriminate between invocation type II (from step #2) and invocation type IV (from step #4), the Bookmarklet Creator can use an appropriate class (e.g. https://w3id.example.org/bookmarklets/protocol/#code-input) or a meta-based pragma or link relation.

  13. Nov 2021
  14. Aug 2021
  15. Jul 2021
  16. datatracker.ietf.org datatracker.ietf.org
    1. It is similarly intended to fail to establish a connection when data from other protocols, especially HTTP, is sent to a WebSocket server, for example, as might happen if an HTML "form" were submitted to a WebSocket server. This is primarily achieved by requiring that the server prove that it read the handshake, which it can only do if the handshake contains the appropriate parts, which can only be sent by a WebSocket client. In particular, at the time of writing of this specification, fields starting with |Sec-| cannot be set by an attacker from a web browser using only HTML and JavaScript APIs such as XMLHttpRequest [XMLHttpRequest].
    2. The WebSocket Protocol is designed on the principle that there should be minimal framing (the only framing that exists is to make the protocol frame-based instead of stream-based and to support a distinction between Unicode text and binary frames). It is expected that metadata would be layered on top of WebSocket by the application Fette & Melnikov Standards Track [Page 9] RFC 6455 The WebSocket Protocol December 2011 layer, in the same way that metadata is layered on top of TCP by the application layer (e.g., HTTP). Conceptually, WebSocket is really just a layer on top of TCP that does the following: o adds a web origin-based security model for browsers o adds an addressing and protocol naming mechanism to support multiple services on one port and multiple host names on one IP address o layers a framing mechanism on top of TCP to get back to the IP packet mechanism that TCP is built on, but without length limits o includes an additional closing handshake in-band that is designed to work in the presence of proxies and other intermediaries Other than that, WebSocket adds nothing. Basically it is intended to be as close to just exposing raw TCP to script as possible given the constraints of the Web. It's also designed in such a way that its servers can share a port with HTTP servers, by having its handshake be a valid HTTP Upgrade request. One could conceptually use other protocols to establish client-server messaging, but the intent of WebSockets is to provide a relatively simple protocol that can coexist with HTTP and deployed HTTP infrastructure (such as proxies) and that is as close to TCP as is safe for use with such infrastructure given security considerations, with targeted additions to simplify usage and keep simple things simple (such as the addition of message semantics).
  17. Jun 2021
    1. From a comment by Muneeb Ali:

      The original Internet protocols defined how data is delivered, but not how it's stored. This lead to centralization of data.

      The original Internet protocols also didn't provide end-to-end security. This lead to massive security breaches. (Other reasons for security breaches as well, but everything was based on a very weak security model to begin with.)

  18. Apr 2021
    1. Can we reconfigure growth to mean richness in difference? Flourishing interdependent diversity of networks, network protocols and forms of interaction? What does this mean for digital decay, and can the decay of files, applications and networks become some form of compost, or what might be the most dignified form of digital death and rebirth?

      Also see Apoptosis

  19. Mar 2021
  20. Feb 2021
    1. We were especially excited to see Dorsey cite Mike Masnick's excellent Protocols, Not Products paper.

      I don't think I've come across this paper before...

      Looking at the link, it's obvious I read it on December 11, 2019.

  21. Jan 2021
  22. Oct 2020
  23. Jul 2020
    1. Syncthing uses an open and documented protocol, and likewise the security mechanisms in use are well defined and visible in the source code. Resilio Sync uses an undocumented, closed protocol with unknown security properties.
  24. Jun 2020
    1. Syncthing uses an open and documented protocol, and likewise the security mechanisms in use are well defined and visible in the source code. Resilio Sync uses an undocumented, closed protocol with unknown security properties.
    1. Akhvlediani, T., Ali, S. M., Angus, D. C., Arabi, Y. M., Ashraf, S., Baillie, J. K., Bakamutumaho, B., Beane, A., Bozza, F., Brett, S. J., Bruzzone, R., Carson, G., Castle, L., Christian, M., Cobb, J. P., Cummings, M. J., D’Ortenzio, E., Jong, M. D. de, Denis, E., … Webb, S. (2020). Global outbreak research: Harmony not hegemony. The Lancet Infectious Diseases, 0(0). https://doi.org/10.1016/S1473-3099(20)30440-0

  25. May 2020
  26. Apr 2020
    1. During the first era of the internet — from the 1980s through the early 2000s — internet services were built on open protocols that were controlled by the internet community. This meant that people or organizations could grow their internet presence knowing the rules of the game wouldn’t change later on.
    2. During the first era of the internet — from the 1980s through the early 2000s — internet services were built on open protocols that were controlled by the internet community
  27. Sep 2017
  28. Aug 2017
    1. Focusing on the fundamentals of grammar is one approach to teaching writing.

      CUE ELA Protocols +UDL Research and background information that can be used to provide support for the use of the protocols

  29. Jun 2016
    1. dynamic documents

      A group of experts got together last year at Daghstuhl and wrote a white paper about this.

      Basically the idea is that the data, the code, the protocol/analysis/method, and the narrative should all exist as equal objects on the appropriate platform. Code in a code repository like Github, Data in a data repo that understands data formats, like Mendeley Data (my company) and Figshare, protocols somewhere like protocols.io and the narrative which ties it all together still at the publisher. Discussion and review can take the form of comments, or even better, annotations just like I'm doing now.