# I am the Watcher. I am your guide through this vast new twtiverse.
#
# Usage:
# https://watcher.sour.is/api/plain/users View list of users and latest twt date.
# https://watcher.sour.is/api/plain/twt View all twts.
# https://watcher.sour.is/api/plain/mentions?uri=:uri View all mentions for uri.
# https://watcher.sour.is/api/plain/conv/:hash View all twts for a conversation subject.
#
# Options:
# uri Filter to show a specific users twts.
# offset Start index for quey.
# limit Count of items to return (going back in time).
#
# twt range = 1 36
# self = https://watcher.sour.is/conv/wwxq6mq
Wow! đł The Gopher community (on the mailing list) is rather hostile đ˘ I asked what the state of Gopher + TLS is these days and the response I got was basically:
- TLS is an abomination
- Gopher is a TCP protocol (doesn't TLS use TCP too?!)
- Gopher is already a fractured ecosystem
- blah blah blah
Not one single positive/constructive response.
Gopher is dead to me in that case đ¤Śââď¸
Wow! đł The Gopher community (on the mailing list) is rather hostile đ˘ I asked what the state of Gopher + TLS is these days and the response I got was basically:
- TLS is an abomination
- Gopher is a TCP protocol (doesn't TLS use TCP too?!)
- Gopher is already a fractured ecosystem
- blah blah blah
Not one single positive/constructive response.
Gopher is dead to me in that case đ¤Śââď¸
@prologic TLS is Transport Layer Security so it's hard to understand why someone would say it's not applicable to gopher?
@abucci Yeah I know. Clearly some people don't understand wtf TCP even means let alone TLS đ¤Śââď¸
@abucci Yeah I know. Clearly some people don't understand wtf TCP even means let alone TLS đ¤Śââď¸
TLS is absolutely applicable to Gopher and people have done it, but there's no standard so everyone implements it differently.
It's not widely implemented in clients or daemons.
Also, lots of people are against TLS because it's too hard to implement on your own; Gopher daemons would need to depend on an external library.
If you want Gopher encrypted, the best option is to make your Gopher daemon accessible as a Tor hidden service.
@mckinley See now why couldn't "they" discuss and have an interim sonceration like this đ
Yes you would have to depend on a library for TLS but so what? That's just good reuse right?
@mckinley See now why couldn't "they" discuss and have an interim sonceration like this đ
Yes you would have to depend on a library for TLS but so what? That's just good reuse right?
@prologic Thatâs the thread, I think:
https://lists.debian.org/gopher-project/2022/10/msg00001.html
Interesting â doesnât feel hostile to me. (These people arenât native english speakers, maybe thatâs an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are âsomething elseâ ⌠đ
đŤ¤
Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and thereâs a couple of clients supporting it, too. I didnât test it, though. If that works, itâd be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley â which, to be fair, predates 20hâs phlog entry from 2020).
So I donât think that things are *that* bleak. đ
(Is âGopher + TLSâ still âstrictly Gopherâ? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)
By the way, you sparked a follow-up thread:
https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic Thatâs the thread, I think:
https://lists.debian.org/gopher-project/2022/10/msg00001.html
Interesting â doesnât feel hostile to me. (These people arenât native english speakers, maybe thatâs an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are âsomething elseâ ⌠đ
đŤ¤
Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and thereâs a couple of clients supporting it, too. I didnât test it, though. If that works, itâd be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley â which, to be fair, predates 20hâs phlog entry from 2020).
So I donât think that things are *that* bleak. đ
(Is âGopher + TLSâ still âstrictly Gopherâ? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)
By the way, you sparked a follow-up thread:
https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic Thatâs the thread, I think:
https://lists.debian.org/gopher-project/2022/10/msg00001.html
Interesting â doesnât feel hostile to me. (These people arenât native english speakers, maybe thatâs an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are âsomething elseâ ⌠đ
đŤ¤
Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and thereâs a couple of clients supporting it, too. I didnât test it, though. If that works, itâd be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley â which, to be fair, predates 20hâs phlog entry from 2020).
So I donât think that things are *that* bleak. đ
(Is âGopher + TLSâ still âstrictly Gopherâ? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)
By the way, you sparked a follow-up thread:
https://lists.debian.org/gopher-project/2022/10/msg00012.html
@prologic Thatâs the thread, I think:
https://lists.debian.org/gopher-project/2022/10/msg00001.html
Interesting â doesnât feel hostile to me. (These people arenât native english speakers, maybe thatâs an important factor here?) Then again, I often read the OpenBSD mailing lists and those really are âsomething elseâ ⌠đ
đŤ¤
Also, Hiltjo posted links to gopher://bitreich.org/0/usr/20h/phlog/2020-06-07T18-28-23-863932.md and gopher://bitreich.org/1/scm/sacc. Apparently, the Gopher server geomyidae does have native TLS support now and thereâs a couple of clients supporting it, too. I didnât test it, though. If that works, itâd be quite a bit simpler than what Solène described in her post (the one mentioned by @mckinley â which, to be fair, predates 20hâs phlog entry from 2020).
So I donât think that things are *that* bleak. đ
(Is âGopher + TLSâ still âstrictly Gopherâ? Nah. But neither is using UTF-8 in Gopher pages and a loooooooot of people do that.)
By the way, you sparked a follow-up thread:
https://lists.debian.org/gopher-project/2022/10/msg00012.html
@movq idk, that sounds pretty hostile to me. The very first responses are to say "if there's TLS it's not gopher", and to post a rant against using TLS at all.
The first exhibits territorialism and gatekeeping, which is by definition hostile. It's also dismissive.
The second comes clean that they are posting a rant, and rants are hostile to an idea/set of ideas.
Not hostile in the sense that they are going to show up at your house and do violence. Hostile in the sense that they've made very clear that this question is not, in their opinions, worth considering.
Personally, I've left communities that had too many people exhibiting behavior like that. Life's too short to waste time with people who act that way.
Hiltjo's response, as you note, is not hostile, and feels welcoming. It treats the question as worth answering and provides information. It'd be nice if the first two people who responded simply hadn't, and Hiltjo's response was the first.
@abucci Interesting. đ¤
I guess I canât understand the âsubtextâ of these messages well enough (since Iâm not a native speaker, either). đ¤ Yes, when you explain it like that, I can begin to understand.
Oh, I missed the message that starts âRANT followsâ. Only saw it just now. Hm.
Still, I suspect that âstrong opinionâ + ânot a native speakerâ is a bad combination. đ
And on top of that, weâre all communicating just through text, you canât hear that persons voice nor see their face.
@abucci Interesting. đ¤
I guess I canât understand the âsubtextâ of these messages well enough (since Iâm not a native speaker, either). đ¤ Yes, when you explain it like that, I can begin to understand.
Oh, I missed the message that starts âRANT followsâ. Only saw it just now. Hm.
Still, I suspect that âstrong opinionâ + ânot a native speakerâ is a bad combination. đ
And on top of that, weâre all communicating just through text, you canât hear that persons voice nor see their face.
@abucci Interesting. đ¤
I guess I canât understand the âsubtextâ of these messages well enough (since Iâm not a native speaker, either). đ¤ Yes, when you explain it like that, I can begin to understand.
Oh, I missed the message that starts âRANT followsâ. Only saw it just now. Hm.
Still, I suspect that âstrong opinionâ + ânot a native speakerâ is a bad combination. đ
And on top of that, weâre all communicating just through text, you canât hear that persons voice nor see their face.
@abucci Interesting. đ¤
I guess I canât understand the âsubtextâ of these messages well enough (since Iâm not a native speaker, either). đ¤ Yes, when you explain it like that, I can begin to understand.
Oh, I missed the message that starts âRANT followsâ. Only saw it just now. Hm.
Still, I suspect that âstrong opinionâ + ânot a native speakerâ is a bad combination. đ
And on top of that, weâre all communicating just through text, you canât hear that persons voice nor see their face.
At any rate, I think many people on that mailing list didnât take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that thatâs one of the main reasons why Gopher is still around. So, if you did âGopher + TLSâ *without* being backwards compatible, then that would be pretty horrible, because youâd be locking out all the old clients. đ
And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I donât see the issue.
Thatâs even in line with Mateusz wrote in the second thread:
> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didnât take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that thatâs one of the main reasons why Gopher is still around. So, if you did âGopher + TLSâ *without* being backwards compatible, then that would be pretty horrible, because youâd be locking out all the old clients. đ
And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I donât see the issue.
Thatâs even in line with Mateusz wrote in the second thread:
> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didnât take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that thatâs one of the main reasons why Gopher is still around. So, if you did âGopher + TLSâ *without* being backwards compatible, then that would be pretty horrible, because youâd be locking out all the old clients. đ
And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I donât see the issue.
Thatâs even in line with Mateusz wrote in the second thread:
> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
At any rate, I think many people on that mailing list didnât take into account that the problem of backwards compatibility has been solved. Gopher is pretty much the only thing that you can still use on very old machines and I suspect that thatâs one of the main reasons why Gopher is still around. So, if you did âGopher + TLSâ *without* being backwards compatible, then that would be pretty horrible, because youâd be locking out all the old clients. đ
And newer simple/minimalistic cilents as well. But as long as it *is* backwards compatible, I donât see the issue.
Thatâs even in line with Mateusz wrote in the second thread:
> My subjective opinion is that any improvement over RFC 1436 is fine, as long as it answers a practical need without degrading the service for legacy implementations.
đ that guyâs post is actually pretty interesting to me. SSL is fugazi? Can it be? đ§
First of all, I was debating whether to take part in this yarn or not. But, here we are. ;-) Second, I never used Gopher and I don't have any feelings about it, neither positive nor negative ones. I basically just acknowlege its existence. :-) And finally, except for @prologic I don't know anybody else in this mailing list discussion, met them all for the first time today.
I just read the whole mail thread and the replies didn't feel unfriendly to me at all. I wouldn't categorize them as *very* friendly either, but as just alright, maybe even decently friendly. Most of them are strict to the point, they simply don't need and want TLS in Gopher. Fair enough. The rant was introduced as such, so I just took it with a grain of salt. Checked it off as strong opinion that I don't share, okay. The one person who wrote everything in lowercase and basically in one big blob attracted my negative attention because of form. I actually first thought, this was a spam message. Unreadable to me.
Now what does that tell us? English is obviously not my mother tongue (that's probably the issue). Are Germans, @movq and myself, cold and don't have a lot of emotion? ;-) I mean, I can understand your points a little bit, @abucci, but while reading the responses I didn't feel the same, not even close. Of course, I don't want to deny you your feelings and how it came across for you. :-) The only goal is to offer some other perspective.
What I want to say, @prologic, don't take it personally. Most of them probably did not want to piss you off. I really don't see bad intentions. Don't take offense, I'm fully with @movq here, strong opinions with English as a second language had caused some unnecessary and unwanted trouble once again.
First of all, I was debating whether to take part in this yarn or not. But, here we are. ;-) Second, I never used Gopher and I don't have any feelings about it, neither positive nor negative ones. I basically just acknowlege its existence. :-) And finally, except for @prologic I don't know anybody else in this mailing list discussion, met them all for the first time today.
I just read the whole mail thread and the replies didn't feel unfriendly to me at all. I wouldn't categorize them as *very* friendly either, but as just alright, maybe even decently friendly. Most of them are strict to the point, they simply don't need and want TLS in Gopher. Fair enough. The rant was introduced as such, so I just took it with a grain of salt. Checked it off as strong opinion that I don't share, okay. The one person who wrote everything in lowercase and basically in one big blob attracted my negative atten
@lyse 𤡠I appreciate your perspective on this, and it's probably good for anyone following along to see multiple perspectives if they care about gopher. We all read and react to things differently, and I have to confess I hadn't thought about the fact that people were not non-native speakers before I wrote my twt.
This document was an interesting read, posted by Hiltjo in the second thread linked by @movq.
It's Bitreich's backwards-compatible standard for extensions to the Gopher protocol, including TLS.
@movq Cameron Kaiser raised a very good point, quite valid đ
@movq Cameron Kaiser raised a very good point, quite valid đ