-
Notifications
You must be signed in to change notification settings - Fork 10
Encryption and public keys #15
Comments
Hi @oelmekki ! Let me share what we have planned for privacy tools.
Let me know if you have any questions or thoughts! EDIT: I expect the browser will get involved with managing keypairs, and provide APIs for using them without actually giving the private keys to applications. |
Oh wow, ok, I see you already quite thought that through :D That sounds awesome! Indeed, the browser managing the keys is the dream solution, I didn't even dare hoping for it too much :) Really love the idea of being able to select peers we're connecting to - indeed, so far, if the user's private key of the app I'm playing with leaks, the user is screwed. Plus, I guess if the browser holds the secret keys, it makes it "easy" to verify those peers (rather than an IP based solution or something). The key registries sound a bit more scary, because it has the "federation" smell around it. But yeah, it's difficult to imagine a source of trust otherwise for changing keys - plus, it's not like if all the data was federated by a few super users, just the keys. I love how ssb handled that recently, with dark crystal : you give a few friends encrypted parts of your secret, and then you can ask it back to them to recover your secret key. I guess rotation could be handled the same way : declaring a few trusted friends, if they all (with maybe a small error margin) say your public key changed, then it's considered changed. Anyway, thanks for your time and answers! |
On the plus side, it's all via dats, so it's almost like a shared dataset. You'll contact a service that manages the dat to make changes, but hey.
Communities could run their own identity registries and it should be very similar. Instead of contacting a service, you DM your friend. |
Sounds cool indeed :) Thanks! |
Hi Paul _o/
Great feature, love it! :)
My first thought when reading about the default schema was that this would be perfect to distribute public keys, somewhat like a decentralized keybase.
The main interest of the dweb for me is to not have my data owned by centralized third parties ; but if it's all public, it kind of misses the point. I guess I'm not the only one to investigate the dweb for privacy reasons? That's why I started to work with dat/beaker rather than ssb (as much as I love ssb), I love how it's easy with beaker to build apps encrypting the data and just sharing the encrypted files.
Right now, I do that in beaker by storing the private (ed25519) key in localStorage and telling the user to download it as a file, then either find it again from localStorage or retrieving the file through an
input[type=file]
. To share their public key with their friends, they're on their own, though (meaning, they'll use centralized solutions like facebook or slack to do it). Love how unwalled.garden would make that easy!Did you consider building encryption within unwalled.garden and beaker? Like, having beaker store our private key, maintaining a local registry of friends' public keys through the unwalled.garden files, then leveraging the
visibility
field to add a "protected" value, which would allow to encrypt the content for a set of given public keys.In any case, with the custom schemas from unwalled.garden, it will make it easy to distribute public keys anyway, so thanks! :)
The text was updated successfully, but these errors were encountered: