brockm on Nostr: UX can easily hide most of the ugliness. Similar URI schemes are in use over many ...
UX can easily hide most of the ugliness. Similar URI schemes are in use over many protocols. From the web, to LDAP, ActiveDirectory, and user experiences have been built that hide them, extremely well. Having a URI scheme allows for multiple resolver protocols, which is pretty important if you want to break free of centralization of the Certificate Authority (CA) architecture we are all reliant on, and is very vulnerable to state-level attack.
Published at
2023-01-22 01:23:31Event JSON
{
"id": "526551da7f5b34ee054af7b763ac465c07ebe8dad800d90239852321c1296e31",
"pubkey": "b9003833fabff271d0782e030be61b7ec38ce7d45a1b9a869fbdb34b9e2d2000",
"created_at": 1674350611,
"kind": 1,
"tags": [
[
"e",
"4d9a6e66d3d7a704318a30376376d457aff03df78fba30eea151318b6e609528",
"",
"reply"
],
[
"p",
"8967f290cc7749fd3d232fb7110c05db746a31fce0635aeec4e111ad8bfc810d"
]
],
"content": "UX can easily hide most of the ugliness. Similar URI schemes are in use over many protocols. From the web, to LDAP, ActiveDirectory, and user experiences have been built that hide them, extremely well. Having a URI scheme allows for multiple resolver protocols, which is pretty important if you want to break free of centralization of the Certificate Authority (CA) architecture we are all reliant on, and is very vulnerable to state-level attack. ",
"sig": "46cce0786e26def0d44d2e7fc314bd5d8fd4517c503a417069b23ba244709c7ce02cdf564b5f9699914f5221d860d43241c008c530b1b1a3e3b064d453bb6569"
}