# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 36
# self = https://watcher.sour.is/conv/wwxq6mq
Wow! 😳 The Gopher community (on the mailing list) is rather hostile 😢 I asked what the state of Gopher + TLS is these days and the response I got was basically:

- TLS is an abomination
- Gopher is a TCP protocol (doesn't TLS use TCP too?!)
- Gopher is already a fractured ecosystem
- blah blah blah

Not one single positive/constructive response.

Gopher is dead to me in that case 🤦‍♂️
Wow! 😳 The Gopher community (on the mailing list) is rather hostile 😢 I asked what the state of Gopher + TLS is these days and the response I got was basically:

- TLS is an abomination
- Gopher is a TCP protocol (doesn't TLS use TCP too?!)
- Gopher is already a fractured ecosystem
- blah blah blah

Not one single positive/constructive response.

Gopher is dead to me in that case 🤦‍♂️
@prologic TLS is Transport Layer Security so it's hard to understand why someone would say it's not applicable to gopher?
@prologic Which mailing list? 🤔
@prologic Which mailing list? 🤔
@prologic Which mailing list? 🤔
@prologic Which mailing list? 🤔
@abucci Yeah I know. Clearly some people don't understand wtf TCP even means let alone TLS 🤦‍♂️
@abucci Yeah I know. Clearly some people don't understand wtf TCP even means let alone TLS 🤦‍♂️
TLS is absolutely applicable to Gopher and people have done it, but there's no standard so everyone implements it differently.
It's not widely implemented in clients or daemons.

Also, lots of people are against TLS because it's too hard to implement on your own; Gopher daemons would need to depend on an external library.

If you want Gopher encrypted, the best option is to make your Gopher daemon accessible as a Tor hidden service.
@mckinley See now why couldn't "they" discuss and have an interim sonceration like this 😆

Yes you would have to depend on a library for TLS but so what? That's just good reuse right?
@mckinley See now why couldn't "they" discuss and have an interim sonceration like this 😆

Yes you would have to depend on a library for TLS but so what? That's just good reuse right?
@prologic That’s the thread, I think:

https://lists.debian.org/gopher-project/2022/10/msg00001.html

Interesting – doesn’t feel hostile to me. (These people aren’t native english speakers, maybe that’s an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are “something else” … 😅 🫤

Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and there’s a couple of clients supporting it, too. I didn’t test it, though. If that works, it’d be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley – which, to be fair, predates 20h’s phlog entry from 2020).

So I don’t think that things are *that* bleak. 😊

(Is “Gopher + TLS” still “strictly Gopher”? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)

By the way, you sparked a follow-up thread:

https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic That’s the thread, I think:

https://lists.debian.org/gopher-project/2022/10/msg00001.html

Interesting – doesn’t feel hostile to me. (These people aren’t native english speakers, maybe that’s an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are “something else” … 😅 🫤

Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and there’s a couple of clients supporting it, too. I didn’t test it, though. If that works, it’d be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley – which, to be fair, predates 20h’s phlog entry from 2020).

So I don’t think that things are *that* bleak. 😊

(Is “Gopher + TLS” still “strictly Gopher”? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)

By the way, you sparked a follow-up thread:

https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic That’s the thread, I think:

https://lists.debian.org/gopher-project/2022/10/msg00001.html

Interesting – doesn’t feel hostile to me. (These people aren’t native english speakers, maybe that’s an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are “something else” … 😅 🫤

Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and there’s a couple of clients supporting it, too. I didn’t test it, though. If that works, it’d be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley – which, to be fair, predates 20h’s phlog entry from 2020).

So I don’t think that things are *that* bleak. 😊

(Is “Gopher + TLS” still “strictly Gopher”? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)

By the way, you sparked a follow-up thread:

https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic That’s the thread, I think:

https://lists.debian.org/gopher-project/2022/10/msg00001.html

Interesting – doesn’t feel hostile to me. (These people aren’t native english speakers, maybe that’s an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are “something else” … 😅 🫤

Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and there’s a couple of clients supporting it, too. I didn’t test it, though. If that works, it’d be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley – which, to be fair, predates 20h’s phlog entry from 2020).

So I don’t think that things are *that* bleak. 😊

(Is “Gopher + TLS” still “strictly Gopher”? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)

By the way, you sparked a follow-up thread:

https://lists.debian.org/gopher-project/2022/10/msg00012.html
@movq idk, that sounds pretty hostile to me. The very first responses are to say "if there's TLS it's not gopher", and to post a rant against using TLS at all.

The first exhibits territorialism and gatekeeping, which is by definition hostile. It's also dismissive.

The second comes clean that they are posting a rant, and rants are hostile to an idea/set of ideas.

Not hostile in the sense that they are going to show up at your house and do violence. Hostile in the sense that they've made very clear that this question is not, in their opinions, worth considering.

Personally, I've left communities that had too many people exhibiting behavior like that. Life's too short to waste time with people who act that way.

Hiltjo's response, as you note, is not hostile, and feels welcoming. It treats the question as worth answering and provides information. It'd be nice if the first two people who responded simply hadn't, and Hiltjo's response was the first.
@abucci Interesting. 🤔

I guess I can’t understand the “subtext” of these messages well enough (since I’m not a native speaker, either). 🤔 Yes, when you explain it like that, I can begin to understand.

Oh, I missed the message that starts “RANT follows”. Only saw it just now. Hm.

Still, I suspect that “strong opinion” + “not a native speaker” is a bad combination. 😅 And on top of that, we’re all communicating just through text, you can’t hear that persons voice nor see their face.
@abucci Interesting. 🤔

I guess I can’t understand the “subtext” of these messages well enough (since I’m not a native speaker, either). 🤔 Yes, when you explain it like that, I can begin to understand.

Oh, I missed the message that starts “RANT follows”. Only saw it just now. Hm.

Still, I suspect that “strong opinion” + “not a native speaker” is a bad combination. 😅 And on top of that, we’re all communicating just through text, you can’t hear that persons voice nor see their face.
@abucci Interesting. 🤔

I guess I can’t understand the “subtext” of these messages well enough (since I’m not a native speaker, either). 🤔 Yes, when you explain it like that, I can begin to understand.

Oh, I missed the message that starts “RANT follows”. Only saw it just now. Hm.

Still, I suspect that “strong opinion” + “not a native speaker” is a bad combination. 😅 And on top of that, we’re all communicating just through text, you can’t hear that persons voice nor see their face.
@abucci Interesting. 🤔

I guess I can’t understand the “subtext” of these messages well enough (since I’m not a native speaker, either). 🤔 Yes, when you explain it like that, I can begin to understand.

Oh, I missed the message that starts “RANT follows”. Only saw it just now. Hm.

Still, I suspect that “strong opinion” + “not a native speaker” is a bad combination. 😅 And on top of that, we’re all communicating just through text, you can’t hear that persons voice nor see their face.
At any rate, I think many people on that mailing list didn’t take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that that’s one of the main reasons why Gopher is still around. So, if you did “Gopher + TLS” *without* being backwards compatible, then that would be pretty horrible, because you’d be locking out all the old clients. 😅 And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I don’t see the issue.

That’s even in line with Mateusz wrote in the second thread:

> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didn’t take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that that’s one of the main reasons why Gopher is still around. So, if you did “Gopher + TLS” *without* being backwards compatible, then that would be pretty horrible, because you’d be locking out all the old clients. 😅 And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I don’t see the issue.

That’s even in line with Mateusz wrote in the second thread:

> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didn’t take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that that’s one of the main reasons why Gopher is still around. So, if you did “Gopher + TLS” *without* being backwards compatible, then that would be pretty horrible, because you’d be locking out all the old clients. 😅 And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I don’t see the issue.

That’s even in line with Mateusz wrote in the second thread:

> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didn’t take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that that’s one of the main reasons why Gopher is still around. So, if you did “Gopher + TLS” *without* being backwards compatible, then that would be pretty horrible, because you’d be locking out all the old clients. 😅 And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I don’t see the issue.

That’s even in line with Mateusz wrote in the second thread:

> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
😆 that guy’s post is actually pretty interesting to me. SSL is fugazi? Can it be? 🧐
First of all, I was debating whether to take part in this yarn or not. But, here we are. ;-) Second, I never used Gopher and I don't have any feelings about it, neither positive nor negative ones. I basically just acknowlege its existence. :-) And finally, except for @prologic I don't know anybody else in this mailing list discussion, met them all for the first time today.

I just read the whole mail thread and the replies didn't feel unfriendly to me at all. I wouldn't categorize them as *very* friendly either, but as just alright, maybe even decently friendly. Most of them are strict to the point, they simply don't need and want TLS in Gopher. Fair enough. The rant was introduced as such, so I just took it with a grain of salt. Checked it off as strong opinion that I don't share, okay. The one person who wrote everything in lowercase and basically in one big blob attracted my negative attention because of form. I actually first thought, this was a spam message. Unreadable to me.

Now what does that tell us? English is obviously not my mother tongue (that's probably the issue). Are Germans, @movq and myself, cold and don't have a lot of emotion? ;-) I mean, I can understand your points a little bit, @abucci, but while reading the responses I didn't feel the same, not even close. Of course, I don't want to deny you your feelings and how it came across for you. :-) The only goal is to offer some other perspective.

What I want to say, @prologic, don't take it personally. Most of them probably did not want to piss you off. I really don't see bad intentions. Don't take offense, I'm fully with @movq here, strong opinions with English as a second language had caused some unnecessary and unwanted trouble once again.
First of all, I was debating whether to take part in this yarn or not. But, here we are. ;-) Second, I never used Gopher and I don't have any feelings about it, neither positive nor negative ones. I basically just acknowlege its existence. :-) And finally, except for @prologic I don't know anybody else in this mailing list discussion, met them all for the first time today.

I just read the whole mail thread and the replies didn't feel unfriendly to me at all. I wouldn't categorize them as *very* friendly either, but as just alright, maybe even decently friendly. Most of them are strict to the point, they simply don't need and want TLS in Gopher. Fair enough. The rant was introduced as such, so I just took it with a grain of salt. Checked it off as strong opinion that I don't share, okay. The one person who wrote everything in lowercase and basically in one big blob attracted my negative atten
@lyse 🤷 I appreciate your perspective on this, and it's probably good for anyone following along to see multiple perspectives if they care about gopher. We all read and react to things differently, and I have to confess I hadn't thought about the fact that people were not non-native speakers before I wrote my twt.
This document was an interesting read, posted by Hiltjo in the second thread linked by @movq.

It's Bitreich's backwards-compatible standard for extensions to the Gopher protocol, including TLS.
@prologic Here’s another (sub)thread from the mailing list which discusses a couple of issues with geomyidae’s approach:

https://lists.debian.org/gopher-project/2020/12/msg00011.html

It’s from two years ago.
@prologic Here’s another (sub)thread from the mailing list which discusses a couple of issues with geomyidae’s approach:

https://lists.debian.org/gopher-project/2020/12/msg00011.html

It’s from two years ago.
@prologic Here’s another (sub)thread from the mailing list which discusses a couple of issues with geomyidae’s approach:

https://lists.debian.org/gopher-project/2020/12/msg00011.html

It’s from two years ago.
@prologic Here’s another (sub)thread from the mailing list which discusses a couple of issues with geomyidae’s approach:

https://lists.debian.org/gopher-project/2020/12/msg00011.html

It’s from two years ago.
@movq Cameron Kaiser raised a very good point, quite valid 👌
@movq Cameron Kaiser raised a very good point, quite valid 👌