Who verifies the sign of repos? #1237
-
The signature included in the commit is not related to a general Bluesky client. Who is going to verify this and what to prevent? One of the usage I think is that Appview notices when BGS creates a fake commit. However, BGS is just one of the components that users depend on in atproto. I want to know what other useful usage is. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 4 replies
-
Of course anyone is capable of verifying the signature on a repo. Defensive clients may opt to do so for instance. Generally, self-certifying data makes it such that you can trust data coming from a non-authoritative source. This allows an AppView or a Feed Generator to trust data from BGS (or elsewhere) even if they're not accessing it directly from the user's home PDS. |
Beta Was this translation helpful? Give feedback.
-
Sure! Makes sense. Maybe another way to phrase @yamarten's question is, does ATP itself specify any specific times or places where signatures should/must be verified? |
Beta Was this translation helpful? Give feedback.
One current example is that the BGS specifically must validate signatures when crawling repos from PDS instances. Signature validation will probably also be mandatory as part of account migrations between PDS hosts. As a general principle, when receiving content from another organization or party it is probably a good idea: an ACME Club AppView consuming from an ACME Club BGS might not bother re-verifying signatures (but maybe they should!).