How Decentralized Is Bluesky Really?
-
@Gaelan
Good is obviously subjective. I will highlight what I find to be โgoodโ itโs a very simple protocol: pretty much JSON+ relays and clients. Identify are keypairs which are unfortunately left up to the users to manually handle but they can be plugged into any frontend. You prefer a blog, image-sharing, link aggregate over Twitter just use any of those kind of clients.
(๐งต1/2) -
Nostr is very grassroots but seems to function well, they use NIPs which are like FEPs.
Culturally, yes itโs a lot of cryptocurrency & Bitcoin folks but you can filter that noise on a client or relay level. I do and thereโs still a surprising amount of quality content & non crypto bro users.
(๐งต2/2)
@Gaelan -
Robert W. Gehlreplied to Christine Lemmer-Webber last edited by
@cwebber I was definitely surprised how journalists called it โdecentralizedโ right when it started. Now I hear journalists call it โfederated.โ Bluesky has good PR, for sure.
-
Steve Batereplied to Christine Lemmer-Webber last edited by [email protected]
@cwebber I'd like to hear more about AP follows the (Hewitt) Actor Model of Computation, if that's the one you mean. Just having message passing and an inbox and a thing called an "Actor" doesn't make the thing a unit of computation. Given the stated importance to AP, I don't see Hewitt's actor model mentioned in the spec or in any of the WG transcripts, so I'm curious what I'm missing.
Actor Model of Computation: Scalable Robust Information Systems
Abstract page for arXiv paper 1008.1459: Actor Model of Computation: Scalable Robust Information Systems
arXiv.org (arxiv.org)
-
Erin ๐ฝโจreplied to Christine Lemmer-Webber last edited by
@cwebber Some notes:
(Also choosing sha256 over sha256d, thereโs maybe the question of length extension attacks, but I suppose the parsing of the document means this is maybe not a problem, Iโm not sure.)
So a fun thing amout merkle-damgรฅrd hash functions is that theyโre only subject to length extension attacks if used at full length. If truncated theyโre not vulnerable. So SHA-256 and SHA-512 are vulnerable, but SHA-224 (which is SHA-256 with different constants and truncated to 224 bits) and SHA-384 (which is SHA-512 with initial different initial constants and truncated to 384 bits) are not. Back in 2012 NIST standardised SHA-512/224 and SHA-512/256 which are similarly truncated versions of SHA-512 with different initial constants which also sidestep the length extension attack issue.
Anyway this is to say that because they truncated the hash in did:plc identifiers (to a level which feels unwise to me too!) theyโre immune to length extension attcks.
-
:PUA: Shlee fucked around andreplied to Christine Lemmer-Webber last edited by
@cwebber this doesnโt answer if federation is a good thing. Science is yet to discover
-
Christine Lemmer-Webberreplied to Evan Prodromou last edited by
@evan I am glad you liked it after reading the whole thing
I absolutely would not turn down a donation from Bluesky to Spritely should they want to but also @bnewbold welcomed and said he would be "honored" to see me write something, but absolutely did not ask me to write a 25 page document, that's just me lol
But there was too much to cover, and I felt I really could not do the issue justice without covering it from every important angle, so I did. Glad it was well received.
-
Evan Prodromoureplied to Christine Lemmer-Webber last edited by
@cwebber @bnewbold I didn't read the whole thing. ๏ธ
Since I actively work on ActivityPub, I can't afford to introduce patented ideas into our specs or extensions, even accidentally or unconsciously.
So, I avoid reading any technical discussions of the BS protocol. I've asked Brian and Mike to offer a public patent license or to release their work through W3C or IETF which also uses a patent license. No luck so far.
Anyway, I'm glad you had fun.
-
find you on :butterfedy1: fediversereplied to smallcircles (Humanity Now ๐) last edited by
@smallcircles @helge @cwebber i had a looksy at that and the webassembly part for one of the technologies was the only turn-off i could see at a glance.
i realize that the addon system for browsers is tivo-isation by #mozilla (terrible) and that addons aren't harnessing an efficient language/codebase and addons might not be able to do everything in a browser. but by the same token, i dont believe we ought to EXPECT everything to be able to be done in a broser.
-
smallcircles (Humanity Now ๐)replied to find you on :butterfedy1: fediverse last edited by
-
Mick ๐จ๐ฆreplied to Christine Lemmer-Webber last edited by
@cwebber amazing, thank-you for taking the time to put this together. This is exactly the sort of in-depth analysis from someone with deep knowledge of the subject I was looking for.
-
-
Christine Lemmer-Webberreplied to Evan Prodromou last edited by
@evan I am reading backwards in time but @bnewbold encouraged me to speak after I had expressed frustration about biting my tongue about things. I don't think this was for Bluesky's benefit at all and, I think you recognize this later but, tbh my article was *extremely* critical, even if polite
Bluesky folks have received it very thoughtfully but trust me I did *not* take that as a given and it could have very much so have not gone that way. I'm glad it did tho
-
Evan Prodromoureplied to Christine Lemmer-Webber last edited by
-
Christine Lemmer-Webberreplied to Steve Bate last edited by
@steve https://en.wikipedia.org/wiki/Actor_model#Fundamental_concepts fundamental concepts section on wikipedia summarizes well
-
Steve Batereplied to Christine Lemmer-Webber last edited by
@cwebber Thanks for the response. Both the original paper and Wikipedia state: "Everything is an actor". Not in AP. In response to messages, actors can create other actors and only modify their own *internal* state. Not specified in AP. Another difference is that AP actors can communicate to other actors without actor addresses (using "as:Public"). Interestingly, an "inbox" (or message queue) is not required in the Actor Model of Computation (see paper). Too many differences to list here...
-
Weatherwaxreplied to Christine Lemmer-Webber last edited by
@cwebber
Great technical analysis that perfectly captures how architecture embodies values. You're right - Mastodon attracts digital idealists willing to sacrifice convenience for independence, while Bluesky draws tech pragmatists seeking ethical alternatives that still work smoothly.
But I think there's a missing piece in this freedom debate. The civil rights movement showed that real transformation often comes through collective commitment - not just independence from authority (Mastodon) or convenient individual choice (Bluesky).
We don't yet have protocols designed for communities seeking freedom through shared purpose rather than from or to something. The technical architecture for that kind of collective action would look very different from both current approaches (not sure what it is).
Thanks for the detailed analysis but I am still waiting for the protocols or ways to use the fact that computers see us as large groups, but, currently, only to aggregate us to sell us stuff. In reality, the computers could give great insight into the power of common identity between groups. No oneโs using that. -
๐ผ๐ฎ๐ป๐ช๐น๐ช๐ฝ๐ฑใใใโฎ(๐๐ฌ๐ง)replied to smallcircles (Humanity Now ๐) last edited by
how about nostr?
how about the pear runtime?
how about dat ecosystem?the runtime works now.
a p2p messenger like keet works now.
nostr works now.to me that is way more inspiring than the more academic work of klepmann.
it is also unlikely the next decentralized social media will come from academia -
๐ผ๐ฎ๐ป๐ช๐น๐ช๐ฝ๐ฑใใใโฎ(๐๐ฌ๐ง)replied to smallcircles (Humanity Now ๐) last edited by
you shpuld try keet messenger.
it has thousands of peers in rooms.
you coupd look at autobase.its more building material to make it easy to define and design your CRDTs and related mechanisms for your app
if you ever used nodejs, just use the pear runtime to get started.
`npx pear run pear://runtime`
and follow the tutorial