# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 3
# self = https://watcher.sour.is/conv/alzvffa
yep, it's not a passwordless solution as a TOTP is a dynamic password, but the idea is to reduce keyloggers and phishing impact a bit by not using the same passwords forever. If you already have 2FA, you reduce a step. It's experimental, and not recommended for current security standards, although it could work for geeks.

More like an indie proposal between passwords and Webauthn without Auth services in the middle (like AWS, Azure, Auth0 and so on)

For example, a proposal from Microsoft I found recently:
![https://www.microsoft.com/en-us/security/business/solutions/passwordless-authentication] (https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/image_RE529Ih?resMode=sharp2&op_usm=1.5,0.65,15,0&wid=3200&hei=1500&qlt=100&fmt=png-alpha&fit=constrain)
I wrote a bit about the idea a few months ago, if anyone wants to experiment with it

https://text.eapl.mx/promoting-the-use-of-dynamic-passwords
I wrote a bit about the idea a few months ago, if anyone wants to experiment with it