cosocial.ca is one of the many independent Mastodon servers you can use to participate in the fediverse.
A co-op run social media server for all Canadians. More info at https://blog.cosocial.ca

Server stats:

143
active users

@evan @tomcoates wow! This is amazing news. I hope you are successful, and it is adopted quickly.

@evan @tomcoates

Congratulations!

If you can fit it into your protocol, I'm hoping for a anonymous communication platform that doesn't require phone numbers, like Signal and Telegram.

@neptune22222 @tomcoates the idea is that you'd be communicating over the fediverse. Your fediverse handle would be how people message you.

@evan @neptune22222 @tomcoates But that identity is controlled by a third party (the instance). How do you intend to be able to use it in e2ee?

@dalias @evan @neptune22222 @tomcoates

Are we going to be able to register a additional public key to use for encrypted messages?

This way you can encrypt and send messages but we can decrypt on device?

Right now only the #activitypub server implementation holds your private key. So not really end to end.

@JsonCulverhouse @dalias @evan @neptune22222 we’re very conscious about the risks of instances holding keys rather than clients. But part of this project is checking into options and potential solutions, so I wouldn’t want to commit to a particular solution right now.

@tomcoates @dalias @evan @neptune22222
When you do your survey it would be good to see if there is some intersection between the identity proofs and keys and other forms of distributed identity. There is a lot of overlap in the underlying tech.

@tomcoates @JsonCulverhouse @dalias @neptune22222 I think E2EE by definition means keys in the client only.

Keys on the server are for HTTP Signature only.

@evan @tomcoates @dalias @neptune22222 good to hear. I think there is a lot in common with distributed identity.

@evan @tomcoates @JsonCulverhouse @neptune22222 Not just where they are, but whose custody. "In the client only" is meaningless if client executes code provided by the server in a context that has access to keys.

@evan @tomcoates oh wow, that’s incredible news! What a cool project to work on.

@evan @tomcoates hot damn! Congrats you two! I would LOVE to see real DMs in Mastodon, E2EE is like icing on the cake.

@evan @tomcoates OooooOoooOoo. Sing out if you need testers!

@evan @tomcoates amazing! Can’t wait for that. E2EE for DMs is something I was missing here a lot.

@evan @tomcoates
Good news. We won't have to read messages like "Be careful, the admin of your instance can read your DMs"...

@evan@cosocial.ca how would this work alongside posts that are addressed to specific people, would this be an opt-in replacement?

@julian yes, an opt-in in-stream upgrade for the current in-the-clear DM system.

@FenTiger @tomcoates not sure yet. We're going to look over the landscape. I really like MLS, which provide encrypted messaging over an abstract transport layer (AP, in this case).

@quitelost @tomcoates thanks! It's at the top of the list.

@evan @cdevroe Yup! I’m with Evan. It’s a tricky problem. No promises we’ll figure it all out!

@tomcoates @evan I was applauding your collective efforts and the grant. :)

@evan @tomcoates I was thinking about this initiative today and was wondering how it was going. I'm sure it's still early days, but I was wondering if there was a good place to keep checking for updates.

@docpop @evan I’m close to completing my write up of the UI elements. I’m assuming we’ll post something more complete in the next month or so. Personally got distracted by civilization collapsing even though I know that makes it more important.