# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 21
# self = https://watcher.sour.is/conv/z3c63ra
Salty.im Blob Storage v1 - HedgeDoc πŸ‘ˆ Updated this doc a bit more today with @abucci's help πŸ™ Kind of need everyone's help though (_please_) to help with the threat modelling part, and any other feedback comments of course πŸ‘Œ Still some work to do...

cc @xuu
Salty.im Blob Storage v1 - HedgeDoc πŸ‘ˆ Updated this doc a bit more today with @abucci's help πŸ™ Kind of need everyone's help though (_please_) to help with the threat modelling part, and any other feedback comments of course πŸ‘Œ Still some work to do...

cc @xuu
Salty.im Blob Storage v1 - HedgeDoc πŸ‘ˆ Updated this doc a bit more today with @abucci's help πŸ™ Kind of need everyone's help though (_please_) to help with the threat modelling part, and any other feedback comments of course πŸ‘Œ Still some work to do...

cc @xuu
Salty.im Blob Storage v1 - HedgeDoc πŸ‘ˆ Updated this doc a bit more today with @abucci's help πŸ™ Kind of need everyone's help though (_please_) to help with the threat modelling part, and any other feedback comments of course πŸ‘Œ Still some work to do...

cc @xuu
@prologic @xuu Have a look at this page for inspiration. Among the nice things he discusses:
- Box: "Package box authenticates and encrypts small messages using public-key cryptography"
- Secretbox: "Package secretbox encrypts and authenticates small messages"
- Saltpack: "Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate"
- Magic wormhole: "This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another".

The first two are Go libraries so may be of special interest. Saltpack was put forward by keybase, but it's also a format that can be implemented in any language. Magic wormhole is implemented in either python or rust; the protocol is described here.

Update: I just found a Go implementation of magic wormhole: wormhole: "Package wormhole provides a magic wormhole client implementation."
@prologic @xuu Have a look at this page for inspiration. Among the nice things he discusses:
- Box: "Package box authenticates and encrypts small messages using public-key cryptography"
- Secretbox: "Package secretbox encrypts and authenticates small messages"
- Saltpack: "Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate"
- Magic wormhole: "This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another". The library is implemented in either python or rust; the protocol is described here

The first two are Go libraries so may be of special interest. Saltpack was put forward by keybase, but it's also a format that can be implemented in any language.
@prologic @xuu Have a look at this page for inspiration. Among the nice things he discusses:
- Box: "Package box authenticates and encrypts small messages using public-key cryptography"
- Secretbox: "Package secretbox encrypts and authenticates small messages"
- Saltpack: "Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate"
- Magic wormhole: "This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another".

The first two are Go libraries so may be of special interest. Saltpack was put forward by keybase, but it's also a format that can be implemented in any language. Magic wormhole is implemented in either python or rust; the protocol is described here.

Update: I just found a Go implementation of magic wormhole: wormhole: "Package wormhole provides a magic wormhole client implementation."

Update 2: Found another one! https://github.com/psanford/wormhole-william
@prologic @xuu Have a look at this page for inspiration. Among the nice things he discusses:
- Box: "Package box authenticates and encrypts small messages using public-key cryptography"
- Secretbox: "Package secretbox encrypts and authenticates small messages"
- Saltpack: "Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate"
- Magic wormhole: "This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another".

The first two are Go libraries so may be of special interest. Saltpack was put forward by keybase, but it's also a format that can be implemented in any language. Magic wormhole is implemented in either python or rust; the protocol is described here.
@abucci Do we really need to overlap here with the already existing spec? πŸ€” -- Which we're going to have to do a v2 on anyway soonβ„’ and maybe we'll document the threat model(s) like we're doing here too πŸ‘Œ
@abucci Do we really need to overlap here with the already existing spec? πŸ€” -- Which we're going to have to do a v2 on anyway soonβ„’ and maybe we'll document the threat model(s) like we're doing here too πŸ‘Œ
@abucci Do we really need to overlap here with the already existing spec? πŸ€” -- Which we're going to have to do a v2 on anyway soonβ„’ and maybe we'll document the threat model(s) like we're doing here too πŸ‘Œ
@abucci Do we really need to overlap here with the already existing spec? πŸ€” -- Which we're going to have to do a v2 on anyway soonβ„’ and maybe we'll document the threat model(s) like we're doing here too πŸ‘Œ
@prologic I'm not sure what you're asking but it never registered with me before that salty uses saltpack. I guess thsrs why it's called salty huh? πŸ€¦β€β™‚οΈ
@abucci Hahahahaha πŸ˜† Yup! When we designed the spec we made sure to use existing crypto borrowed from some of the best minds like the guy originally behind keybase who then layer when on to create heys.pub which we use many parts of πŸ‘Œ
@abucci Hahahahaha πŸ˜† Yup! When we designed the spec we made sure to use existing crypto borrowed from some of the best minds like the guy originally behind keybase who then layer when on to create heys.pub which we use many parts of πŸ‘Œ
@abucci Hahahahaha πŸ˜† Yup! When we designed the spec we made sure to use existing crypto borrowed from some of the best minds like the guy originally behind keybase who then layer when on to create heys.pub which we use many parts of πŸ‘Œ
@abucci Hahahahaha πŸ˜† Yup! When we designed the spec we made sure to use existing crypto borrowed from some of the best minds like the guy originally behind keybase who then layer when on to create heys.pub which we use many parts of πŸ‘Œ
@xuu is working on double ratchet support 🀞
@xuu is working on double ratchet support 🀞
@xuu is working on double ratchet support 🀞
@xuu is working on double ratchet support 🀞