Skip Navigation
It's time for a hard fork of Mastodon (DRAFT)
  • Mutuals-only posts would be useful, and have been requested since 2018 if not earlier. As @ShittyKopper points out there are challenges; Claire's 2020 comment https://github.com/mastodon/mastodon/issues/7135#issuecomment-636767048 discusses the issues in more detail. Then again some other fediverse software has them already ... and Claire's comparison to follower-only posts highlights that it could be done, it's just not a priority. So this is another good example of something that's not likely to get addressed with today's structure, and potentially could be a fork with different priorities -- if resources are avaialble, which is of course a big if.

  • It's time for a hard fork of Mastodon (DRAFT)

    This is a work in progress, so feedback very welcome! And, if please check out the Mastodon poll about interest in a fork

    Contents:

    • Intro
    • There's a lot of low-hanging fruit
    • Safety is an especially good area to focus on
    • It's not as easy as it sounds ...
    • But it's not like it defies the laws of physics!
    • What about funding?
    • Make sure there are funded leadership and project roles for Black, Indigenous, Muslim, trans, queer, and disabled people as well as others who have been marginalized in Mastodon's development history
    • Let a thousand forks bloom!
    • Clever conclusion! tbd

    As the tbd in that last bullet implies, the conclusion isn't written yet. Like I said it really is a work in progress!

    3
    Eight tips about consent for fediverse developers
  • Thanks for the tipoff on having to turn off the VPN, it's not at all intentional -- and it's not a good look for a site with privacy in its name! I'll try to figure out what's going on, it's pretty vanilla Ghost / nginx hosted on a Digital Ocean droplet so not immediately obvious.

    And yeah, it'll be interesting to see how well the messaging you for approval works out in practice. As you could say it could look like phishing; and even if it's fine when just one app is doing it, it'll be annoying if there are hundreds. Also, there's a Mastodon setting to silently ignore DMs (and I think other platforms have similar options as well). And for Bridgy Fed, it would be great to have a mechanism that works symmetrically between the fediverse and Bluesky ... but Bluesky doesn't have DMs. Tricky!

    I should probably mention something about being a good ally in that section, that's a good suggestion. That's not the main message I'm trying to convey though, I really do mean it as a warning to cis guys to be careful. These firestorms are tiresome for everybody, ould we please just not? Also btw sometimes particularly unpleasant for whoever sets them off. But maybe there's a better way to word it.

  • Eight tips about consent for fediverse developers
  • Thanks, glad you think they're reasonable. I don't see it as using ActivitiyPub implying consent; it's more that ActivityPub doesn't provide any mechanisms to enforce consent. So mechanisms like domain blocking, "authorized fetch", and local-only posts are all built on top of ActivityPub. I agree that many people want something different than ActivityPub currently provides, it'll be interesting to see how much the protocol evolves, how far people can go with the approach of building on top of the protocol, or whether there's shift over time to a different protocol which has more to say about safety, security, privacy, and consent.

  • Eight tips about consent for fediverse developers
  • Thanks for the feedback -- and thanks for reading them despite the bristling. I couldn't come up with a better way to put them ... I know they'll cause some people to tune out, but oh well, what can you do.

    I don't think these solutions are inherently unscalable, it's more that there hasn't ever been a lot of effort put into figuring out how to make things scalable so we don't have any great suggestions yet. I wrote about this some in The free fediverses should focus on consent (including consent-based federation), privacy, and safety (the article is focused on instances that don't federate with Threads, but much of it including this section is true more generally):

    There aren't yet a lot of good tools to make consent-based federation convenient scalable, but that's starting to change. Instance catalogs like The Bad Space and Fediseer, and emerging projects like the FIRES recommendation system. FSEP's design for an"approve followers" tool, could also easily be adapted for approving federation requests. ActivityPub spec co-author Erin Shepherd's suggestion of "letters of introduction", or something along the lines of the IndieWeb Vouch protocol, could also work well at the federation level. Db0's Can we improve the Fediverse Allow-List Model? and the the "fedifams" and caracoles I discuss in The free fediverses should support concentric federations of instances could help with scalability and making it easier for new instances to plug into a consent-based network.

    (The post itself has links for most of these.)

  • Eight tips about consent for fediverse developers

    If you're a developer working on a fediverse app or service and want to get it right – or just don't want to be the center of the next firestorm – here are a few suggestions.

    16
    Eight tips about consent for fediverse developers

    If you're a developer working on a fediverse app or service and want to get it right – or just don't want to be the center of the next firestorm – here are a few suggestions.

    1
    Federal privacy legislation update: the American Privacy Rights Act (APRA)
  • Preemption is bonkers from a privacy perspective, and also flies in the face of the basic principle that the states are "the laboratories of democracy." But from a corporate perspective preemption is wonderful ... it keeps pesky pro-privacy states like California and Washington from ever raising the bar above whatever can get through Congress! So historically privacy advocates and organizations have always opposed preemptive federal legislation. But that wall cracked in 2022, where EPIC Privacy joined pro-industry privacy orgs like Future of Privacy Forum to support a preemptive bill (although EFF and ACLU continued to oppose the preemptive aspects).

    The argument for supporting a preemptive bill (not that I agree with it, I'm just relaying it) is that the federal bill is stronger than state privacy bills (California unsurprisingly disagreed), and many states won't pass any privacy bill. Industry hates preemption, industry hates the idea of a private right of action where people can sue companies, most Republicans and corporate Democrats will do what industry wants, so the only way to pass a bill is to include at most one of those. So the only way to get that level of privacy protection for everybody is for people in California, Maine, Illinois, etc, to give up some of their existing protection, and for people in Washington etc to give up the chance of passing stronger consumer privacy laws in the future. California of course didn't like that (neither did other states but California has a lot of votes in Congress), and Cantwell's staffers also told us in Washington that she was opposed to any preemptive bill, so things deadlocked in 2022.

    With this bill, I'm not sure why Cantwell's position has changed -- we're trying to set up a meeting with her, if we find out I'll let you know. I'm also not sure whether the changes in this bill are enough to get California on board. So, we shall see.

  • Federal privacy legislation update: the American Privacy Rights Act (APRA)

    cross-posted from: https://lemmy.blahaj.zone/post/10889989

    Big news in DC: a new bipartisan, bicameral proposal for a "compromise" federal privacy bill, the American Privacy Rights Act (APRA). At this point, take it all with a grain of salt; in 2022, the initial draft of the bill was promising, but it got weakened substantially by the subcommittee and then weakened further by the committee. I haven't read the discussion draft yet so don't have any strong opinions on it.

    8
    Federal privacy legislation update: the American Privacy Rights Act (APRA)

    Big news in DC: a new bipartisan, bicameral proposal for a "compromise" federal privacy bill, the American Privacy Rights Act (APRA). At this point, take it all with a grain of salt; in 2022, the initial draft of the bill was promising, but it got weakened substantially by the subcommittee and then weakened further by the committee. I haven't read the discussion draft yet so don't have any strong opinions on it.

    0
    How to block Threads on Mastodon

    Should the Fediverse welcome its new surveillance-capitalism overlords? Opinions differ! If you're one of the fediverse influencers who sees Threads arrival it as "historic" and "a glimpse of the future" ... well, you might want to skip this post.

    But if you're one of the many many people on the fediverse who doesn't want to deal with Threads, read on!

    8
    How to block Threads on Mastodon

    Should the Fediverse welcome its new surveillance-capitalism overlords? Opinions differ! If you're one of the fediverse influencers who sees Threads arrival it as "historic" and "a glimpse of the future" ... well, you might want to skip this post.

    But if you're one of the many many people on the fediverse who doesn't want to deal with Threads, read on!

    0
    It's possible to talk about The Bad Space without being racist or anti-trans – but it's not as easy as it sounds

    There's another wave of discourse about The Bad Space on the microblogging side of the fediverse, so here's my article from a couple of months ago.

    If you're familiar with Fediseer, there's some discussion of similarities and differences in Compare and contrast: Fediseer, FIRES, and The Bad Space

    1
    Steps towards a safer fediverse
  • Agreed that there isn't one particular model that's right or wrong for everybody, and that a split is likely -- a region like today's fedi and that welcomes Threads, and a more safety-focused region (with more blocking, a more consent-based federation).

  • Cyberbullying Gone Global: Fediverse Spam and Operation Beleaguer
  • There have been other waves, it's just that once they get shut down everybody loses interest and moves on. The PR for the one of the changes Mastodon just made was implemented in May 2023 after the Doge spam wave. And here's a June 2019 post talking about exactly the same kind of attack: "The problem we are experiencing is the spammer signing up on random open instances and sending spam remotely."

  • Here Are the Secret Locations of ShotSpotter Gunfire Sensors
    www.wired.com Here Are the Secret Locations of ShotSpotter Gunfire Sensors

    The locations of microphones used to detect gunshots have been kept hidden from police and the public. A WIRED analysis of leaked coordinates confirms arguments critics have made against the technology.

    Here Are the Secret Locations of ShotSpotter Gunfire Sensors
    21
    Cyberbullying Gone Global: Fediverse Spam and Operation Beleaguer
    blog.fyralabs.com Cyberbullying Gone Global: Fediverse Spam and Operation Beleaguer

    On February 15th, newly-created Fediverse accounts started posting spam messages from various instances, sending invites to a Discord server for a Japanese troll organization. This spam was widespread across the Fediverse. The posts frame ap12 from “KuronekoServer” as the culprit behind the operatio...

    Cyberbullying Gone Global: Fediverse Spam and Operation Beleaguer

    A really interesting look at the recent spam wave.

    11
    Steps towards a safer fediverse

    The good news is that there are some straightforward opportunities for significant short-term safety improvements. If fediverse funders, developers, businesses, and "influencers" start prioritizing investing in safety, the fediverse can turn what's currently a big weakness into a huge strategic advantage.

    Contents:

    • It's about people, not just the software and the protocol

    • It's also about the software

    • And it's about the protocol, too

    • Threat modeling and privacy by design can play a big role here

    • Design from the margins – and fund it!

    3
    Steps towards a safer fediverse
    privacy.thenexus.today Steps towards a safer fediverse

    Part 5 of "Golden opportunities for the fediverse -- and whatever comes next."

    Steps towards a safer fediverse

    The good news is that there are some straightforward opportunities for significant short-term safety improvements. If fediverse funders, developers, businesses, and "influencers" start prioritizing investing in safety, the fediverse can turn what's currently a big weakness into a huge strategic advantage.

    Contents:

    • It's about people, not just the software and the protocol

    • It's also about the software

    • And it's about the protocol, too

    • Threat modeling and privacy by design can play a big role here

    • Design from the margins – and fund it!

    0
    Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act (US Politics)
    www.eff.org Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act

    The authors of the dangerous Kids Online Safety Act (KOSA) unveiled an amended version this week, but it’s still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like.

    Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act

    KOSA's supporters are claiming that the latest version addresses concerns from the LGBTQ community, and a few LGBTQ organizations (including GLAAD and HRC) have endorsed this version, but don't be fooled: the dozens of LGBTQ and human rights organizations who have been opposing KOSA were not consulted about these changes and so while there are improvements, it's still far from sufficient. This article's EFF's take on the amended version. TL;DR summary:

    > * LGBTQ+ Youth will be at risk of having content, educational material, and their own online identities erased. > * Young people searching for sexual health and reproductive rights information will find their search results stymied. > > We are asking everyone reading this to oppose this latest version, and to demand that their representatives oppose it—even if you have already done so.

    1
    Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act
    www.eff.org Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act

    The authors of the dangerous Kids Online Safety Act (KOSA) unveiled an amended version this week, but it’s still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like.

    Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act

    EFF's take on the amended version of KOSA. TL;DR summary:

    > We are asking everyone reading this to oppose this latest version, and to demand that their representatives oppose it—even if you have already done so.

    9
    PCLOB Report on NSA use of XKEYSCORE analysis tool

    This is the just-released unclassified version of the Privacy and Civil Liberties Oversight Board's December 2020 classified report on the National Security Agency’s (NSA’s) use of XKEYSCORE, an intelligence analysis tool.

    0
    Business is business: Snap, Microsoft, and X endorse the anti-LGBTQ+, pro-censorship KOSA bill
    privacy.thenexus.today Business is business: Snap, Microsoft, and X endorse the anti-LGBTQ+, pro-censorship KOSA bill

    What's important is *looking like* they're trying to protect children -- even though KOSA would actually harm kids

    Business is business: Snap, Microsoft, and X endorse the anti-LGBTQ+, pro-censorship KOSA bill

    If you're in the US, https://stopkosa.com and EFF's page make it easy to contact your Senators and ask them to oppose #KOSA.

    0
    Steps towards a safer fediverse (DRAFT)
  • Yep. But, even though I didn't suggest it, I didn't explicitly say that it didn't mean global blocklists. So I clarified it, and added a footnote with more detial.

    As Instance-level federation decisions reflect norms, policies, interpretations, and (sometimes) strategy discusses, opinions differ on the definition of "bad actor." So the best approach is probably going to present the admin of a new instance with a range of recommendations to choose between based on their preference. Software platforms should provide an initial vetted list (along with enough information for a new admin to do something sensible), and hosting companies and third-party recommenders should also be able provide alternatives.

  • Steps towards a safer fediverse (DRAFT)

    cross-posted from: https://lemmy.blahaj.zone/post/7992691

    > There are some straightforward opportunities for short-term safety improvements, but this is only the start of what's needed to change the dynamic more completely. > > This is a draft, so feedback welcome!

    20
    Steps towards a safer fediverse (DRAFT)
    privacy.thenexus.today Steps towards a safer fediverse

    Part 5 of "Golden opportunities for the fediverse -- and whatever comes next."

    Steps towards a safer fediverse

    There are some straightforward opportunities for short-term safety improvements, but this is only the start of what's needed to change the dynamic more completely.

    This is a draft, so feedback welcome!

    0
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TH
    The Nexus of Privacy @lemmy.blahaj.zone

    The Nexus Of Privacy looks at the connections between technology, policy, strategy, and justice.

    Posts 38
    Comments 61
    Moderates