#social 2019-09-13

2019-09-13 UTC
#
melody
nightpool[m]: yeah, that still leaves major holes in conversations, i think it's because the same thing doesn't happen if you don't follow people whose replies start subthreads
#
melody
i have been using a single-user instance for a long time and i can't follow any conversation where i don't follow every participant basically because of this
#
melody
relays can but don't always help that
#
melody
i'm not sure if there's a way to make replies-to-replies maintain a thread context in a way that would allow inbox forwarding to cover this case but in practice it doesn't
#
melody
there also seem to be other gaps in practice, but i don't know enough specifics to diagnose what might be causing them
#
jaywink[m]
inbox forwarding is there for exactly this reason, to ensure context is kept. it sounds like it just isn't implemented correctly if all the replies are not delivered to all participants - maybe because of the microblogging environment?
#
jaywink[m]
personally I always calculate the root of all replies and use that for context of calculating who should be delivered to (in terms of forwarding replies)
xmpp-social joined the channel
#
jesopo
nightpool[m]: thnx!
#
jesopo
so if i have to:[public, followers], there's a better chance their followers will get to see my reply?
#
jesopo
or followers in the cc?
#
mardy
dansup: Hi! I'm the author of PhotoTeleport (http://www.phototeleport.com) and was wondering if you have some API documentation for uploading photo. I found https://github.com/pixelfed/pixelfed/issues/1054 but it doesn't say much
#
nightpool[m]
jesopo: yep!
#
jesopo
nightpool[m]: to or cc?
#
nightpool[m]
up to you
#
cwebber
moin moin
#
lain_soykaf
is that socialhub thing up, btw?
rigelk joined the channel
#
nightpool[m]
looks like theoretically
#
nightpool[m]
ah, it's still being created by whoever was setting it up
#
rigelk[m]
it should be publicly announced by the next meeting
cwebber and BitBot joined the channel
#
lain_soykaf
Adding Emoji Reactions to pleroma: https://git.pleroma.social/pleroma/pleroma/merge_requests/1662
cwebber joined the channel
#
cjd
This "social network from hell" thread is so much fun :)
#
lain_soykaf
:)
#
jesopo
when your follow to a locked account is approved, how do you then see the nonpublic toots from before you followed?
#
jesopo
or does it push the old toots to the new follower's inbox? or
#
melody
you don't
#
melody
at least, in practice, in the software i know about offhand, it does not backfill content in that scenario or any other, but it's up to software behavior whether to try -- i am not sure if software that keeps a local cache allows you to see follower-only posts that were delivered to other people on your instance once you become a follower, or what happens if you're on the same instance as somebody with past follower-only posts
#
melody
but in practice you cannot expect that new followers will be able to see old posts on a locked account
#
melody
just like you cannot expect that poorly connected accounts will be able to see anything anywhere
#
melody
these should be solvable problems but they are not practically solved in existing implementations
#
lain_soykaf
if the posts arrived before, you will see the old posts in pleroma
#
lain_soykaf
this can happen if somebody has already been following that person and the posts are on the server
#
melody
this is all unspecified behavior ultimately and there's a reasonable definition of follower-only posts where the software would make the decision not to share with anyone that wasn't explicitly addressed when it was sent
#
melody
even if the posts arrived
#
melody
since this isn't something in the spec
#
cjd
Encryption is a really good way to make a spec get enforced
#
cjd
Or even just to make it get completely thought out, if you're encrypting messages, in order to make the instances interoperate you actually need to think out all of these details and write them down
#
melody
maybe, but i think it also would have left a lot less room for innovation or use cases that could drive things in new directions
#
melody
when you need everything perfect ahead of time it leaves no room for needs you didn't consider
#
melody
there's a tradeoff
#
melody
though i think my vision is pretty well at odds with what most people seem to want out of the fediverse
#
melody
or at least what most people involved in fediverse dev want out of the fediverse
#
cjd
Is your vision written somewhere (?)
#
cjd
Or is it not a burdon to explain it to me now ?
#
melody
no and no sadly, are the short answer versions
#
melody
i have a lot going on in my head but ultimately i'm approaching things from an anti-harassment and anti-abuse focus as an overriding concern and i've got a lot of ideas for what that means that are largely incompatible both with how the fediverse works now and with the direction i'm sensing it moving
#
cjd
Ok, I'd really love to hear your ideas - though be warned, I'm sort of a blackhole here because I'm very likely to lose interest in social networking before I ever write any code - but I enjoy talking about things
#
melody
like, the things that worry me most especially are the movement towards prioritizing censorship-resistance and immutability to support wider distribution of content -- those properties tend to make harassment resilient and it's a desirable set of properties for vanishingly few kinds of content, it feels like a concession to technology over the human interest in general -- its possible to mitigate impact but im skeptical of how it will play out
#
cjd
Against deletion and expiration you mean ?
#
melody
so like i see a lot of people are really excited about content being able to survive nodes going down -- i understand why, but hyper-durable public content that nobody can control is not actually a desirable property for me, it makes abuse mitigation functionally impossible
#
cjd
Oh, I didn't fully grasp this about datashards
#
melody
datashards is still not fully formed to the degree that it would be impossible to mitigate this, and i think there's probably ways to use it that wouldn't be as risky
#
cjd
Actually my personal preference is to have an originator of content and have everyone else "agree" not to store it longer than it's http header says to
#
melody
but it's unclear to me to what extent the practical reality will undermine best efforts to mitigate the risks
#
melody
censorship-resistant networks are harassment-prone networks historically though
#
melody
they are breeding grounds for abuse
#
melody
so im skeptical of big pushes for social networks to be censorship-resistant/hyperdurable
#
cjd
You might have noticed my current source of amusement being "imagine a social network which maximizes drama", but even then, I'm really not that positive about this data-lives-forever stuff
#
melody
i think there are limited scenarios where this is a desirable property of content
#
melody
and things like news publishing might be one of them
#
melody
and i'm not saying you want to optimize for maximum disposability either
#
cjd
I have multiple directions of thought here: 1. map out the space so we understand what the tools can be 2. maybe in some cases more drama actually makes less
#
cjd
Anyway, in any system I'm actually going to use, I really don't want data living forever
#
melody
"a social network that maximizes drama" would probably look a lot like the current microblogging-based fediverse but with publishable anonymous dms and quote-boosting
#
melody
it's already pretty good at exploding itself three times daily
#
cjd
I'm making a little document of the *options* which increase drama, I'm not so interested in the stuff which is forced on people because they'll quickly just turn it off
#
cjd
But I start to think that maybe the way to make things better is to enable, in the UI, bad behaviors which were always available to someone who could write code
#
melody
i doubt it
#
cjd
Obvious example being hacked screenshots... currently most people believe them, but if there was a screencap button which first allowed you to modify the post before screencapping it, then nobody would believe them
#
cjd
Anyway, it's one hypothesis and one which gives me some amusement to think about
#
melody
i don't think it would change the believability much actually, i think you'd be surprised how context-sensitive it already is whether people will believe them or not, if the screencap is believable people will believe it regardless of how easy it is to fake, especially accompanying a message asserting its authenticity
#
cjd
hmm
#
melody
memes based on faking screencaps are already really common on some platforms, so its well known how fake-able they are
#
melody
people still believe ones purporting to be real
#
melody
especially if they explain away why they're no longer public by claiming the original was deleted
#
melody
no way to verify, if it's convincing and in character, people will buy it
#
cjd
Oh yeaah, I can totally see that happening
#
melody
"make it really easy to do bad things so nobody will trust anything" doesn't turn out to be a particularly functional strategy, people will make decisions about what to trust anyway, adding friction to doing manipulative things makes it, well...harder to do them, and makes fewer people interested in going to the effort -- that makes the resourced people doing them anyway relatively more dangerous but shrinks the scale of the problem
#
cjd
hmm
#
aaronpk
that also sounds like something someone with a great deal of privilege who hasn't actually had to deal with online harrassment would say
#
cjd
Oh, I totally am
#
cjd
When you can increase the friction from the victim side (mostly cryptography), that probably works well... On the agressor side increasing friction is probably going to run into trouble once people figure out how to disable the feature.
#
melody
you need to attack the problem from both ends in a decentralized network, relatively few attackers are motivated enough to modify the software to disable the features, especially in ways that are undetectable, and unresourced attackers who don't control their own deployments can't modify the stock software, so that protects you from a lot of drive-by harassment that isn't driven by a sophisticated and highly motivated adversary
#
melody
once you hit "sophisticated and highly motivated" then the protections from the other direction become more critical
#
melody
but you can get further than you think on simple friction
#
melody
and social norms
#
cjd
If there are things which are supposed to be made difficult, that's not really a problem but it needs to be super clearly explained in the protocol
#
cjd
One drum I've been banging lately is a "pledge" system - where a server makes a pledge to (for example) delete data when requested and to honor expiration
#
cjd
If the server doesn't make the pledge, you choose whether to federate with it and a user can choose whether their messages should be federated with servers who don't pledge
#
cjd
but if a server violates a pledge, that's probably something which can be construed as either a GDPR violation or some kind of contractual breach
#
melody
that's an example of a social norm, and i think those types of systems can work well in semi-open or semi-closed networks, but falls apart for more fully open ones and wouldn't work for something like a p2p network
#
melody
so i think that depends a lot on what you're trying to accomplish
#
cjd
Yes, that's why I'm currently pretty negative on p2p and much more positive about federation
#
melody
i don't think it's really plausible to nail a p2p solution yet, i'm keeping an eye out
#
cjd
fair point, maybe something comes along, but I'm not that hopeful at this point
#
cjd
deletion is a Hard Problem
#
cjd
But I find it really interesting that you and I, approaching social networking with the exact opposite objectives, actually agree on quite a few features