@lauren Im still trying to confirm if this is their actual policy. That no user or server admin in bluesky can actually ban or delete content, but only end users can choose to see, or not see it.
So far, from what I see, it might be that later scenario.
@lauren I was kinda amazed that any social network would launch with what in essence was a "Show bloody gore, spam and hate, and fake account content" toggle, too.
I was HOPING that like the Fediverse that each admin of a BlueSky service can mute or block or ban such content for all. But not sure that is so, yet.
@tchambers @lauren I don't believe "instance" admins have any say over what content federates and what doesn't.
As in, instances (or "nodes" in BS parlance, I think?) are just account/data storage. Admins, as far as I know, have no agency and barely any power in the system.
@lauren @tchambers I am too lazy to dig for it right now but I remember reading in their docs pretty explicit mentions that whole point is that from the user's perspective it should not matter which instance they are on.
I mean, even here:
https://atproto.com/guides/faq
> Account portability is the major reason why we chose to build a separate protocol. We consider portability to be crucial because it protects users from sudden bans, server shutdowns, and policy disagreements.
@lauren @tchambers also this:
https://atproto.com/guides/overview#speech-reach-and-moderation
> ATP's model is that speech and reach should be two separate layers, built to work with each other. The “speech” layer should remain neutral, distributing authority and designed to ensure everyone has a voice. The “reach” layer lives on top, built for flexibility and designed to scale.
"Speech" is what nodes do, "reach" is what (winner-takes-all bigger-is-better) recommendation algorithms do.
Node admins have no say over recco algos.
I read the same, but interpreted it differently. It's bad, but different bad?
I read it as:
* User data is stored in Merkle trees. Basically github repos where each post, like, comment etc, is like a commit.
* Each commit author is a DID, which is stable.
* You can host your GitHub repo of activity on any host. That's the "speech" part. You can set up your own lil nazi repo if you want.
* But search indexes across hosts. That's the "reach" part. Host admins filter
@dr2chase @lauren @rysiek @tchambers
Very much so. "Freedom of speech, not freedom of reach" makes sense, but rhymes with things that, well, let's call them "1A absolutists," love to say.
I'm also getting a "moderation is super hard and super expensive! Let's outsource it to instance admins!" flavor.
It'll be interesting to see what moderation decisions the main BlueSky instance makes when they're tested.
My ideal world is something like the Hachyderm team runs an AT protocol instance.
@mekkaokereke @dr2chase @lauren @rysiek
I am hopeful for, and looking to help support an ActivtyPub <--> BlueSky bridge.
@tchambers @mekkaokereke @dr2chase @lauren @rysiek Given BlueSky’s copyright policy, won’t such a bridge effectively be illegal?
Attached: 1 image @[email protected] @[email protected] @[email protected] Bluesky is not actually federated (yet). It’s built on a closed, proprietary, copyrighted protocol. They own your data. Bluesky is not comparable to Mastodon on anything but a micron-thin, superficial level. https://icosahedron.website/@bitbear/110284465013958645 https://mashable.com/article/bluesky-twitter-terms-of-service
@bitbear this is getting better and better.
@bitbear @tchambers @mekkaokereke @dr2chase @lauren @rysiek
the license mentions "Bluesky Web Services", so prob the operators of bsky.social. idk how this would work but this couldn't hold up in court.
@mekkaokereke @dr2chase @lauren @rysiek @tchambers The question is whether folks like the Hachyderm team would be on solid technical/legal ground to do so.
In the AP/Masto federation model, each instance hosts (+ publishes) a partial copy of the entire Fediverse as *produced* or *seen* by accounts there. Bad content may exist outside that copy, but moderation literally removes it from the copy you're hosting.
@mekkaokereke @dr2chase @lauren @rysiek @tchambers In these sorts of replication-centric models, moderation is all about what's allowed within your copy.
Logged-in users of that instance can grow the replica by posting or boosting content. Other Fediverse users can add to that replica by replying to or mentioning folks there.
Mods can prune or block any of that, to control what everyone sees via URLs from that instance.
@mekkaokereke @dr2chase @lauren @rysiek @tchambers So far, it's much less clear what the corresponding story will be for folks running AT/bsky instances.
Specifically, does content from a user's PDS (personal data server) ever get replicated anywhere else, or is it always accessed directly from a canonical source?
Does the AT protocol allow (or require) unmoderated access to all content from the PDS at a given instance?
@pevohr @mekkaokereke @dr2chase @lauren @rysiek
👍 Exactly this question. Yes.
I see confusion/possible jeopardy in that today, because there's no distinction between the AT protocol (git in this analogy) and Bluesky (GitHub in this analogy). Because BlueSky is the only instance of the AT protocol.
The maintainers of git can say, "Hey, Nazis might use this! We have no control! Don't blame us!" but GitHub can't say the same if they host illegal/harmful content.
I do see the devs talking about actively building in the ability to block and ban users. I think block is coming this or next week.
And I think AT Protocol host admins can build their own pluggable indexers, and feed algorithms. So no one can make you host CSAM, or any content you don't want. At least, that's my understanding? I could be wrong.
Their "what's hot" feed is a placeholder implementation that just filters on likeCount > 8. But admins can roll their own
Thus far, I've only seen personal blocking, and not banning. And not clear to me yet the role and power admins have in moderation for all, other than setting labels for all, who can choose to use or ignore. Still looking.
@lauren Those concerns are orthogonal from a technological perspective.
e.g. SILC (Secure Internet Live Conferencing) is end-to-end encrypted with Perfect Forward Secrecy & has mitigations to defend against malicious server operators from eavesdropping, yet it does not prohibit server operators or channel operators from kicking/banning abuse.
The falsehood that end-to-end encrypted messaging facilitates CSAM is a canard.
Also see: @alexwinter's TEDx Talk.
@lauren Push back may still be necessary. SILC (and SSH for that matter) were both developed at a time when even exporting so-called "strong cryptography" from the USA was considered illegal.
In other words: the world has gotten friendlier to cryptography, not the other way around.
Also see: https://en.wikipedia.org/wiki/Bernstein_v._United_States
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren I know Moxie personally, and do not consider Signal to be a protocol of merit. I have written about this publicly, repeatedly, for years. I know some of their other devs and even offered to work for them to fix their problems, but there are court transcripts with Signal logs entered as evidence, I consider them non trustworthy, to understate it.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren I am also not alone in shunning Signal.
Also see:
https://www.jwz.org/blog/2018/08/signal/
https://www.jwz.org/blog/2017/03/signal-leaks-your-phone-number-to-everyone-in-your-contacts/
https://www.jwz.org/blog/2021/04/signal-hops-on-the-dunning-krugerrand-bandwagon/
etc. @alexwinter @mekkaokereke @rysiek @tchambers
Drew DeVault: I don't trust Signal: I expect a tool which claims to be secure to actually be secure. I don't view "but that makes it harder for the average person" as an acceptable excuse. If Edward Snowden and Bruce Schneier are going to spout the virtues of the app, I expect it to actually be secure when it matters - when vulnerable people using it to encrypt sensitive communications are ...
@lauren The US is of course not immune, it's one of the worst places on Earth for human rights abuses and privacy violations. But two decades ago there were not the preponderance of multiple (some interoperable) encryption tools that exist now. I had Cisco VPN concentrator CD-ROMs which said: "Not for export outside of the USA" and "Made in Mexico" on the same friggin label two decades ago.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren " pulling out of countries where end-to-end crypto is made illegal" seems to be rather different than, e.g. (now PhD) Niels Provos' efforts to work on OpenSSH by DRIVING ACROSS THE USA BORDER so he was not in violation of international laws while he was a grad student at UMich. Niels Provos did self sacrifice to help all, Signal has not demonstrated anything approaching that, anywhere, ever.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren So I guess people should contact their legislatures?
As it stands: FreeS/WAN, OpenIKED, Vula, Wireguard, OpenVPN and more exist, with complete source code, accessible internationally. So, legislatures will be hard pressed to put that genie back into a bottle; particularly since USG and .mil utilize much of that already, as do Fortune 500 companies. You can't just legislate away functioning infrastructure via magic, it doesn't work that way. @alexwinter @mekkaokereke @rysiek @tchambers
@lauren Well, in my experience: all governments fall. Some sooner than later. The USA is in a Roman decline stage from my vantage.
Cuneiform, outlived Sumeria.
Hieroglyphs outlived Egypt.
Latin persists despite the fall of Rome.
I think code will be much the same.
The Great Firewall of China? Was supplied by Cisco last I checked.
DNS: open source.
So uhhh, you think open source doesn't help? I think you're off your rocker if so.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren I have been incarcerated.
I have been to China.
Stop putting words into my mouth.
Stop spreading FUD.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren You aren't welcome.
Your tone was excruciating and uncalled for with me.
@lauren And I was personal friends with Doug Engelbart.
Do you always write others with this much vitriol?
It seems awfully rude.
We would not even be communicating right now in this modality without:
TCP (BSD)
DNS (ISC)
ActivityPub (multiple open source implementations).
Windows, Mac, ChromeOS, IOS, Android: all downstream of open source projects.
@alexwinter @mekkaokereke @rysiek @tchambers
@lauren ARPANet site 1 at UCLA, was still after Engelbart's group at SRI.
Also, after SAGE.
I think you think too highly of yourself and are resting on your laurels and it looks disgusting from here.
@lauren Change your diet.
No more Big Macs.
No more Coca colas.
Maybe you'll stop caring so much about failed governments and start treating life on Earth with more compassion and respect.
@lauren
"I don't mention anything about UCLA"
Sure seems to contradict:
"And by the way, I've been working on the Internet since before there was an Internet (ARPANET site 1 at UCLA), and on Open Source long, long, long before the term was coined." (https://mastodon.social/@lauren@mastodon.laurenweinstein.org/110268796785422058)
JFC, writing with you is exasperating.
Do you realize what this looks like to anyone else?
@lauren From my vantage:
all governments fall.
Cuneiform: outlasted Sumeria.
Hieroglyphs: outlasted Egypt.
Latin: outlasted the Roman empire.
I am pretty confident that code will be similar.
I have NEVER had success as an individual with any governance structure. What is going to make a difference for me now that never worked in the past?