9
How does lemmy implement Auth?
(lemm.ee)
This is a community for discussion about this particular Lemmy instance.
News and updates about lemm.ee will be posted here, so if that's something that interests you, make sure to subscribe!
Rules:
If you're a Discord user, you can also join our Discord server: https://discord.gg/XM9nZwUn9K
Discord is only a back-up channel, !meta@lemm.ee will always be the main place for lemm.ee communications.
If you need help with anything, please post in !support instead.
Uuh why?
There's a whole multitude of resons that could be argued for both approaches. I prefer this option because:
Why would you not want to trust the developers of each fedi software to hold this information, instead of trusting every instance manager to hold this instead? IMO that is a more vulnerable design choice instead of having a central authority managing user authentication, unless I am missing something?
I suppose this discussion is more suited on each software's github instead of a place to discuss this instance in particular, I didn't know how each software implements user authentication so I posted here.
E: I can now see why you are alarmed by my question. That is actually a good point. I am not sure if user authentication being handled by a central authority would violate principles of decentralization, which emphasize on interoperability and freedom of movement between different software and instances, instead of implementation of one component. I'm not sure if the management of authentication needs to be decentralized in the fediverse, as decentralization of freedom of movement itself is sufficient to prevent undesirable software implementations. I'd argue that managing authentication by instance managers is still a concentration of authority, albeit it is less centralized than a single source of truth. But I would love to hear arguments for why managing authentication by a single source is dangerous.