Keyhive – Local-first access control(inkandswitch.com)

166 points by dannyobrien 4 days ago | 13 comments

  • erlend_sh 3 days ago
    We’re evaluating Keyhive for use in our distributed chat application and my colleague wrote an in-depth explainer on Keyhive’s underlying Key Encapsulation Mechanism BeeKEM, which is a decentralized offshoot of TreeKEM used in MLS: http://meri.garden/a-deep-dive-explainer-on-beekem-protocol/
    [-]
    • dannyobrien 2 days ago
      Thank you for writing this -- it clarified a lot for me in the original piece!
  • Too 3 days ago
    Their claim that every request goes through the hot path of a central auth db is stretching the truth quite a bit. With Oauth2 you get a signed access token once from the Id Provider, then you reuse this token several times until it’s given expiry time has run out. It is up to the resource server to validate the token scope, signature and the expiry time. This can be done offline as long as the resource server has the public key of the IdP. Ssh certificates work the same way.

    Obviously, now the resource server instead becomes your central guard of access, and is far from a local-first crypto based solution as they describe. Just that the way it’s pictured sounded overly dramatic.

  • NeutralForest 3 days ago
    Ink and Switch has been such a source of joy for me. I like reading their articles because they come from such a different place than what you currently see in most software (Cloud based subscriptions). Just a breath of fresh air backed by cool tech and cool people. Thanks!
  • ctm92 3 days ago
    That callout card on the top of the site really messed with my brain with it being slightly tilted
    [-]
    • eqvinox 3 days ago
      Same here, plus the underlining is seriously triggering me o.O
    • stronglikedan 3 days ago
      Probably designed by a "full stack developer" instead of a designer.
    • Xss3 3 days ago
      Oh man i hate that with a passion.

      Devs, why?

  • benchloftbrunch 3 days ago
    Note: this has absolutely nothing to do with the Windows registry, despite the name
  • chr15m 4 days ago
    Cool. I think you could use a CRDT (even a simple LWW structure) on top of Nostr which already works and has all of the properties you are looking for.
    [-]
    • jakelazaroff 4 days ago
      Could you explain how, for people not familiar with Nostr?
      [-]
      • chr15m 3 days ago
        On further review this is quite a lot further developed than what I suggested above. Sorry for the noise!
        [-]
        • pvh 3 days ago
          It does indeed turn out to be a difficult and subtle problem. We've tried to balance minimizing novelty (always risky in cryptographic systems) with achieving the various security and scaling properties we're looking for. We're very lucky at Ink & Switch to be working with Brooke Zelenka on this one.
  • richwisdomwise 3 days ago
    [flagged]