Advertisement ยท 728 ร— 90

Posts by Justin Case

Thanks for the tag, we'll work on this.

1 month ago 2 0 1 0

Here is the #TennisSky feed

bsky.app/profile/did:...

2 months ago 3 0 1 0

That's fair, but we wanted to keep the price point low for barrier of entry.

There are additional tiers that people can donate more than $5.

2 months ago 3 0 0 0

We are actively working to bring down current costs and optimize infrastructure.

We appreciate the feedback, assistance, and support.

#Clearsky

2 months ago 26 6 1 1

We get $.61 for every $1 donated so we are only asking for $3k. Our DB is the bulk of the costs, ~$2k and ~5TB of data. It is a managed instance.

We have been transparent and haven't done anything shady so it's strange for people to assume that's what's going on initially.

2 months ago 7 1 4 0

I'm open to suggestions on how to make things more efficient.

2 months ago 4 0 4 0

We aren't paying salaries.

2 months ago 2 0 2 1

You know we don't get exactly $1 from the donation, right? The costs isn't $5000/mo.

2 months ago 0 0 1 0

I'm currently watching a Roblox funeral and I am weak ๐Ÿ˜‚

3 months ago 2 0 0 0
Advertisement

All high roads have been taken, it's a traffic jam up there.

4 months ago 8 1 0 0

And the only consequence is the user decides not to log in. The security of the implementation is sound.

4 months ago 3 0 2 0

We've already dropped down in permissions. This is a none issue now.

4 months ago 3 0 1 0

This is a clash of the "privacy" userbase and "data transparency" userbase.

Sit back and get some popcorn.

4 months ago 5 0 0 0

Initially, people begged for these features to be behind a login.

4 months ago 3 0 2 0

It won't send the sensitive authorization code to an unapproved location. Additionally, all of our communication uses HTTPS, and Bluesky's OAuth implementation enforces the use of the state parameter and PKCE (Proof Key for Code Exchange) to prevent code interception and session hijacking.

4 months ago 0 0 0 0

โ€‹If an attacker tried to swap the link, Bluesky's server would reject the request or refuse to redirect the user to the malicious URL. even if a malicious link were somehow injected onto our site, the Bluesky server controls the redirection.

4 months ago 0 0 1 0

โ€‹We mitigate this using strict redirect URI validation, we have pre-registered a specific, exact URL with Bluesky (the Authorization Server).

When you start the login, we tell Bluesky: "After the user authorizes access, only send them back to this exact, pre-registered address."

4 months ago 0 0 1 0

Explain how.

4 months ago 0 0 1 0

I am disappointed but not surprised. We are working to bring services to the community so that you are informed about your data. We appreciate all the support people have given and we are learning from the criticism.

4 months ago 37 4 1 0
Advertisement

A looottttaaaa people in replies complaining and being down right nasty about a free service that someone has dedicated a ton of their time to simply to help you have more transparency about your account, which they absolutely did not have to do! Yโ€™all have an astonishing sense of entitlement!

4 months ago 161 30 6 2

Lol

4 months ago 1 0 0 0

There is a difference between something being ready and you being upset that those are the permissions. The implementation is ready and working.

4 months ago 2 0 1 0

Literacy is dead because why would you used quotes for something you weren't quoting what someone said verbatim. We asked you we error were you seeing and you didn't reply.

4 months ago 2 0 2 0

It is ready. The current OAuth implementation is secure, that's what we've been explaining. And we also have updated the permissions that are being asked when you log in.

4 months ago 1 0 1 0

I appreciate your kind words and sticking your neck out for me ๐Ÿซถ๐Ÿฟ

4 months ago 16 0 2 0

The larger non specialized/technical user base is already using OAuth. Itโ€™s your early/technical adopters that you are experiencing friction with.

I really disagree with the framing of this as a problem with OAuth and not app passwords

4 months ago 9 2 1 1
Advertisement

I tried to use just "atproto" and I just tried again and I get this error: "The remote endpoint returned an error: Scope "transition:generic" is not declared in the client metadata"

4 months ago 1 0 1 0

I tried to use just "atproto" and I just tried again and I get this error: "The remote endpoint returned an error: Scope "transition:generic" is not declared in the client metadata"

4 months ago 0 0 1 0

Thanks for the advice.

4 months ago 0 0 1 0

That is the only permission set available, which is stated in the thread. We understand if you want to wait until Bluesky is done with adding the smaller permission scopes. We plan to drop down to the least permissions as soon as they are available.

4 months ago 2 0 3 0