Repository: https://github.com/solid/specification - Technical Reports: https://solidproject.org/TR/ - Code of Conduct: https://github.com/solid/specification#code-of-conduct
csarven on main
Update solid-oidc reference. Ba… (compare)
csarven on main
Add 2022-05-18 minutes (compare)
csarven on main
Add privacy-principles (compare)
based on the WAC https://www.w3.org/wiki/WebAccessControl
Servers are required to recognize the class
foaf:Agent
as the class of all agents. This indicates that the given access is public. In some cases this will mean that authentication is therefore not required, and may be skipped. When a resource is being written, however, it may be necessary to associate the change with some kind of ID for accountability purposes.
acl:AuthenticatedAgent
makes sense if the server constrains the identity providers that are trusted. In traditional web applications with external identity providers, this tends to be a closed set (e.g. login with Google, FB and Twitter but not any arbitrary identity system), and there, acl:AuthenticatedAgent
makes sense. If, however, identity in Solid is entirely decentralized and if resource servers need to be able to negotiate auth tokens from an open set of identity providers, then there is effectively no difference between an “authenticated” agent and an unauthenticated agent: I can create an ephemeral identity provider with an ephemeral WebID and call that an acl:AuthenticatedAgent
which could get a higher level of access just because I have some scripts running this ephemeral infrastructure
So W3C (Sir Tim, no less) turned down the opportunity to host the JS standard because they felt the web should be declarative-only. Imagine a declarative-only web today.
"Javascript: the first 20 years" https://buff.ly/30TpkPu (Brilliant article in a brilliant journal!)
https://twitter.com/technosophos/status/1273614442874445825?s=20