Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discourage centralization #293

Closed
ahsane opened this issue Aug 22, 2018 · 5 comments
Closed

Discourage centralization #293

ahsane opened this issue Aug 22, 2018 · 5 comments

Comments

@ahsane
Copy link

ahsane commented Aug 22, 2018

In order to discourage centralization of the web, authors should have an incentive to keep their websites active.

One way is to make sure is that the author's server provides the client with the decryption key to decrypt the package.

i.e:

  1. example.com signs and packages example.com/index.html and submits to google.com
  2. google.com distributes example.com/index.html
  3. users downloads example.com/index.html from google.com
  4. user connects to example.com for the index.html's decryption key
  5. browser decrypt the index.html package supplied by google with the decryption key supplied by example.com

This all should be optional to the author. Some authors might only want google.com to distribute the html/css/js for faster loading but ensure that the client has a first party contact with example.com too.

It is already possible to do the same with javascript, but the web should also provide a native way to do this.

@ahsane ahsane changed the title Request Ability to discourage centralization Aug 22, 2018
@ahsane ahsane changed the title Ability to discourage centralization Discourage centralization Aug 22, 2018
@sleevi
Copy link

sleevi commented Aug 22, 2018 via email

@ahsane
Copy link
Author

ahsane commented Aug 22, 2018

I am no expert in cryptography, but used a non-detailed overview to convey what I wanted (had no other words to explain) and know if it is practical.

It sounds like you aren’t concerned about the cryptography, per se, but
want to ensure origins remain in control, correct?

We'll if control means that user can only access the site/content after pinging to the author's server, in this case "example.com".

@sleevi
Copy link

sleevi commented Aug 22, 2018

I see. That's the opposite of the design goal for the use cases.

@ithinkihaveacat
Copy link
Contributor

@ahsane A signed exchange package is valid for up to 7 days. (The exact period is controllable by the author, but this is expected to be >0 days.)

This means that users may see content that appears to be from example.com (i.e. the URL bar of the browser reads example.com) up to 7 days after example.com has lost network connectivity and completely disappeared from the net.

@cramforce
Copy link
Collaborator

For all practical purposes the content in a web packages also has to be available at the packaged URL. If you load a package in a browser and hit reload, it would be a terrible user experience if the content wouldn't load again. While this certainly can happen theoretically, any practical use would try to avoid this problem as much as possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants