• 0 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle
  • This is terrific. Thank you for starting this discussion.

    I don’t think we can or should wait for individual users to make these decisions. Server admins are the ones who understand the risks and so should make this call. Guidance for server admins based on past experience (cough XMPP!) should be quite welcome.

    I might refine the bit about altered API versions to really focus on the real problem: proprietary extensions. We probably want to leave the door open to try out additions to the spec that come with detailed RFCs.

    But we know from XMPP that proprietary extensions are a huge problem.






  • Your mother really can open and print a Markdown file now. It has come that far.

    But I totally agree with your core point. The gulf between “most environments” and “everywhere” is still a big deal.

    That said, for those who hate creating PDF files, I know of a great pure text format that converts very nicely to PDF.



  • MajorHavoc@lemmy.worldtoxkcd@lemmy.worldxkcd #743: Infrastructures
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    Most environments will correctly format a Markdown document without any trouble now if sending it to a co-editor.

    If it needs to be tamper resistant, it’s easily converted to PDF.

    What’s not especially easy, today, is adding advanced styling (like a watermark) to Markdown, since Markdown itself has no provision for it. I accomplish that through a connected CSS file, but that’s a bit of an advanced move.





  • The compromise I’ve landed on is that I host my own DNS mx records, and point them to a paid enterprise mail provider.

    This gets me the advantages of a paid provider while keeping my actual email address fully mine, to take wherever I want.

    I did still have to learn a bunch of DNS rules in order to send all the correct “I’m not an evil spammer” headers and DNS records. But following a one page tutorial worked for me.

    Edit: A disadvantage of my approach is that I’m still at the mercy of my email provider if I want to export my message history, and for the privacy of my message history.



  • Sometimes the obvious solution is the way to go.

    Your idea sounds good to go ahead and publish your pubkey(s) to fully public URL you control and can memorize.

    Then you can stash or memorize the curl command needed to grab it (them) and authorize something to it (them).

    A lot of more complicated solutions are just fancy ways to safely move private keys around.

    For my private keys, I prefer to generate a new one for each use case, and throw them out when I’m done with them. That way I don’t need a solution to move, share or store them.

    Edit: Full disclosure - I do also use Ansible to deploy my public keys.