bhaugen is a user on social.coop. You can follow them or interact with them if you have an account anywhere in the fediverse.

Re eating -

one more alternative: -ssb
For "using git collaboratively without a central, closed-source point of origin"

github.com/noffle/git-ssb-intr
git.scuttlebot.io/

Word of caution: git-ssb works very differently from github/gitlab et al.
Would take some getting used to.

I'm asking for tips in SSB and will pass on anything that seems useful, if anybody wants.

bhaugen @bhaugen

The conversation is moving fast. Here's my current summary of the implications of github.com/noffle/git-ssb-intr or probably any decentralized collaborative git repositories:

When using git-ssb anyone, not just the owner, can make a commit to a repository. That's radically different from the other git interfaces.

But it does not necessarily matter.

if you just just a specific git hash, it may be possible for an attacker to generate a colliding sha1 hash.

But if you combine it with a message id and only use messages linked to from that message (in the DAG of links), then you can be sure of getting the same content, since the published logs are immutable.

For belts and braces you create a tag with the message id, and use that.

MIght also use something like w3c-ccg.github.io/ocap-ld/ or ACLs, but at least one of maintainers of git-ssb thinks that means you just can't handle handle the decentralization...

I am not venturing an opinion on that last point...

@bhaugen the only attacker who can do that is the original creator of the colliding commit, when they originally created it.

A sha1 preimage attrack would be necessary for any stronger attack.

And tags add no security unless gpg signed.

No idea what you mean with the message ids and dags and stuff.

@joeyh

Hey thanks, you might understand the situation better than me.

> No idea what you mean with the message ids and dags and stuff.

Those are features of git-ssb. Or just ssb. scuttlebutt.nz/

But @joeyh thanks, and please continue to help me refine this info. I haven't got a response to my rough draft in SSB yet.

@bhaugen an nice tool to have would be a way to generate a gpg key pair from your ssb key pair.
(And vice-versa.)

Then you could gpg sign git tags with your ssb key and push to git-ssb, and ssb users could verify your signature using git's gpg integration.

However, anyone can overwrite any tag in git-ssb, which allows a DOS attack.

And people are not exactly great at remembering to check signatures either, especially given git's current interfaces for it.