Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Edit: oh wait I'm completely wrong, that's not a key, that's an ID in a directory, lol. The public key thing is just a plan.

There's a thing called DID that identifies you. There's a few options, but one is called "DID PLC" with a sample implementation here:

https://github.com/did-method-plc/did-method-plc

With the disclaimer that I haven't dug into it seriously enough, I understand it's a public key (that I can also rotate) that I can use to prove that an account somewhere else is really mine. Note that I have no idea what the private key is, or how to dig it out - I'm sure that's documented somewhere, but I wasn't interested enough for now.

TL;DR: there definitely is a theoretical mechanism for users to "take their toys with them." How it works out in practice is a different matter. I suspect most users wouldn't know they're supposed to keep a bundle of data stored somewhere for a dark hour. I also wonder how the protocol protects itself from people accidentally putting that data in public.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: