one thing i wonder about is how the long term ui ux of all this works. i feel like it would at least potentially lead to users drowning in caps. and inevitably thered be more than one cap system if the way "sso" has been actually done in the real world at fang level companies is any indication.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CAJ7XQb4Fs7MEw4Jz1FpgENwW%3DoiuDPgQ%3DvaMhrn5L7dr9H1PGw%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z2UEyfNdmiwH5Xbh%2B1pYkz5eUH%2BQWknzERCh6MB_6ASiA%40mail.gmail.com.
How would shifting the problem from traditional corporations to hypothetical corporation-like DAOs change things?
--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+u...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z33OAeb-JB1b6NUgOrD4402UxYjzX3rmHFebWaQeyA19g%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CAMpet1Uq7m6MtN8JHn-ZiRRiNQ%3D3VXu3DrH6qMmN1SL3bZ09jQ%40mail.gmail.com.
On Dec 26, 2022, at 11:08 AM, Alan Karp <alan...@gmail.com> wrote:
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/A99C9B78-8705-41CD-B1F9-0B76AE7F0652%40iitbombay.org.
I agree that this is a nice pattern. An argument against it, I
think, is that several (many?) individuals would need to make
decisions about what to revoke once the subject became a
namespace, and without centralized, automatic revocation of
access, the revocation would not happen reliably. Is notification
to Bob and Carol enough to ensure that revocation happens
reliably?
- johnk
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z3btVMrKANF%2BdDOfTL%2BdeEQgChR-yqzen1F9xcUOYp9yA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+u...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CAFwScO9KcJEfTvLGW%3DsgTzku_Qj7WV-3%3D8qCdnTVP6eW57mcWw%40mail.gmail.com.
Well put! This makes it clear that Bob should not act in his personal capacity while doing professional work. This is what i was trying to get at.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/D5274380-D12E-4914-8F52-EB6A1986908B%40iitbombay.org.
I agree that this is a nice pattern. An argument against it, I think, is that several (many?) individuals would need to make decisions about what to revoke once the subject became a namespace, and without centralized, automatic revocation of access, the revocation would not happen reliably. Is notification to Bob and Carol enough to ensure that revocation happens reliably?
Scribit Alan Karp dies 26/12/2022 hora 11:08:
> What is to prevent some of those delegations being to a sock puppet?
And if we simply revoke all delegations made by Bob, it means every
"worker bee" in his former service now needs to reacquire
capabilities.
If they can do that easily, what would prevent the sock puppet to do
the same?.
So isn't the real question more about how to prevent Bob from creating
a sock puppet?
If there is a service that can authenticate genuine agents of the
system and extract their capabilities from Bob's membrane, you can
disable his membrane when he leaves the service/company.
--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+u...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/Y6xmBBDi727wH6i5%40viper.autogriff.com.
On Wed, Dec 28, 2022 at 7:51 AM Pierre Thierry <pie...@nothos.net> wrote:Scribit Alan Karp dies 26/12/2022 hora 11:08:
> What is to prevent some of those delegations being to a sock puppet?
And if we simply revoke all delegations made by Bob, it means every
"worker bee" in his former service now needs to reacquire
capabilities.
If they can do that easily, what would prevent the sock puppet to do
the same?.
So isn't the real question more about how to prevent Bob from creating
a sock puppet?
If there is a service that can authenticate genuine agents of the
system and extract their capabilities from Bob's membrane, you can
disable his membrane when he leaves the service/company.Similarly, in the original scenario in which Bob only has access to a proxy that does the actual delegations, the proxy can do the vetting you propose. In that case, sock puppets never get any capabilities. The difficulty is distinguishing a legitimate sock puppet, such as one Bob sets up so a service he runs has only some of his authority, versus a malicious one that Bob sets up to use as a back door if he gets fired. It can be done, but the job is not a trivial one.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z0u4qtobg9uVqL67%3DkBMdQbjFR1x5%3D06AZYfSKYkzyRPw%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CABrd9SSfe2zNpDGRwfWV8uO21OiuKFOg52MZAVws9-W%3D_D2NLQ%40mail.gmail.com.
Keynote sounds a lot like the PEP-PDP approach. Is that right?
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z0NdL-bhhc_4YvMhm1TJzgsOAH0sbaD49Pn2hy%3DXzS48A%40mail.gmail.com.