#dev 2021-07-28
2021-07-28 UTC
lasr[m] joined the channel
# Ruxton sorry aaronpk, sharedData exists but PostPage is emty ;) https://imgur.com/a/W8saW1z
SamWilson[m], Seirdy and capjamesg joined the channel
# Murray[d] !tell Ruxton - just a thought, but it seems like some people have the ability to upload to Instagram atm. Based on the screenshot, aaronpk does not. I'm guessing Insta are experimenting with a new desktop interface (with uploads etc. enabled) so if you have that option it could be why things are different
# Loqi Ruxton: Murray[d] left you a message 1 minute ago: - just a thought, but it seems like some people have the ability to upload to Instagram atm. Based on the screenshot, aaronpk does not. I'm guessing Insta are experimenting with a new desktop interface (with uploads etc. enabled) so if you have that option it could be why things are different
# @GirelliGabriele Ever heard of #webmentions? I am trying to set them up on my Jekyll-based GitHub-hosted blog. #comingsoon
https://ggirelli.info/blog/2021/07/12/new-skin (twitter.com/_/status/1420338133997178880)
[Rose] joined the channel
# @GirelliGabriele Ever heard of #webmentions? I am trying to set them up on my #Jekyll-based #GitHub-hosted blog. #COMINGSOON
https://ggirelli.info/blog/2021/07/28/webmentions (twitter.com/_/status/1420346923463151623)
# @derhess ↩️ For this requirement checkout @indiewebcamp #webmention (https://indieweb.org/Webmention) implementations or #fediverse #ActivityPub protocol https://activitypub.rocks/ (twitter.com/_/status/1420354255513395204)
shoesNsocks1 and capjamesg joined the channel
# @petergoes ↩️ Site header and code examples:
https://www.petergoes.nl/blog/review-webmentions-before-publishing-with-github-actions/ (twitter.com/_/status/1420396597058449408)
# vikanezrimaya <GWG "Anyone up to any interesting dev"> is fixing bugs considered interesting?
# vikanezrimaya it's more of a bug inside my brain but
# vikanezrimaya Kittybox reacts in an interesting way when I do `curl -d@-` with JSON and forget to set a content-type
# vikanezrimaya it completely ignores the JSON and sets it as a property name apparently, because curl defaults to doing form-encoded
# vikanezrimaya sometimes it's very funny to debug, especially when I'm rushing to fix a mistake I made when posting something with manually-crafted edit requests
# vikanezrimaya and I do a lot of manual posting with Micropub, so I've learned all the commands by heart and I could probably write a valid Micropub request with my eyes closed
# vikanezrimaya and I just often forget to send a content-type header
# vikanezrimaya is that an english idiom or something?
# vikanezrimaya my brain is confused
# vikanezrimaya sorry
hendursaga joined the channel
# vikanezrimaya I think I need to make a tool which will help me with posting proper Micropub requests
# vikanezrimaya hmmmmm yeah I definitely need to do that
# vikanezrimaya something that could help me craft Micropub requests, for example, posting notes or replies
# vikanezrimaya or allow me to just dump a JSON file in there and properly send it
# vikanezrimaya I should also make it open-source
oodani and capjamesg joined the channel
# Rattroupe More details here: https://blog.reiterate.app/software/2021/07/27/authorio-0-8-2-released/
cadeyrn[d] joined the channel
# vikanezrimaya <Rattroupe "Does anyone have strong opinions"> in my last production-grade IndieAuth setup I combined the password entry and the scope disclosure screen so that the user will **think** before they blindly accept the consequences
# vikanezrimaya I'd suggest keeping a list of apps that the user has already used at least ones (save redirect URIs maybe?) and requiring some form of authentication if an unknown app is trying to authenticate
KartikPrabhu joined the channel
# vikanezrimaya I know. But it's too easy to just blindly click "sign in"
# vikanezrimaya The password entry protects from that by encouraging the user to look over the scope list another time while their hands are clicking all over the keyboard
# vikanezrimaya in retrospect that was a good thing for me even though there aren't any malicious sites on IndieWeb
# vikanezrimaya Yes
# vikanezrimaya (maybe I should fix the lack of malice on IndieWeb, just as a proof-of-concept)
# vikanezrimaya try some social engineering in a controlled environment, maybe trying to, let's say, present fake h-app to an authorization endpoint to trick the user into authenticating - it could've worked with one of my IndieAuth endpoint drafts...
# vikanezrimaya and then present it to the IndieWeb community as a public challenge, to design a UX that would prevent or make some of these attacks harder
justache joined the channel
# [schmarty] providing working proof-of-concepts for security issues and working with developers to fix them doesn't sound like malice.
# vikanezrimaya it's simulated malice
# vikanezrimaya simulating malicious entities for the greater good of the community
# vikanezrimaya pretending to be a villain!
# vikanezrimaya it's fun to think of it that way
# [schmarty] i disagree strongly with the sentiment that the indieweb community needs "desire to cause pain, injury, or distress to another"
# vikanezrimaya it needs to protect itself from it tho
# vikanezrimaya know thy enemy and all of that
# [schmarty] rather than reinforcing us-vs-them dynamics, i think working to uncover unintended behavior and help fix it should be approached from a harm-reduction standpoint.
# vikanezrimaya yeah
# [schmarty] ie - focus on the behavior and how to prevent it rather than ascribing feelings and intent to real-or-imagined adversaries
# vikanezrimaya then it could be titled as a test-suite of potential security holes or unexpected behavior resulting from unintended behaviors or spec deviations
# vikanezrimaya the usefulness stays the same anyway no matter how it's named
# [schmarty] 💯
# vikanezrimaya I imagine the UX being similar to, e.g. webmention.rocks - a collection of separate pages describing a flaw, an interactive test suite that can uncover the flaw and a list of suggestions to help mitigate it
# vikanezrimaya * I imagine the UX being similar to, e.g. webmention.rocks - a collection of separate pages with each describing a flaw, an interactive test suite that can uncover the flaw and a list of suggestions to help mitigate it
KartikPrabhu joined the channel
# [snarfed] agreed, *.rocks are focused on spec compliance, but still useful examples. https://github.com/kbsriram/checkmention is a similar security-specific test suite for webmention
# vikanezrimaya definitely consider putting something like an app pretending to be something else with h-app - because that might actually be dangerous
# vikanezrimaya an endpoint should never trust what an app says about itself besides the redirect URI
# vikanezrimaya i'd consider showing the redirect URI next to the "Allow" button
# vikanezrimaya this would obviously be a user-checked manual test
# vikanezrimaya but I think the endpoint should present an app's identity in an unambiguous way
# vikanezrimaya (did I write that word correctly?)
[fluffy] joined the channel
# vikanezrimaya Yeah, I'm worried that the same is possible with IndieAuth
# vikanezrimaya oops
# vikanezrimaya well, h-app is an unofficial extension, isn't it?
# vikanezrimaya makes sense it wouldn't be in the spec
# vikanezrimaya either way, any website could present a confusing h-app markup when being authenticated for with IndieAuth and therefore confuse the user into doing something unintended
# vikanezrimaya yay
# vikanezrimaya that's exactly what I wanted to suggest to mitigate the issue
# vikanezrimaya it's a good thing that this idea is already floating around
# [KevinMarks] hm aperture seems to be timing out trying to find tanteks feed
[tantek] joined the channel