A daily collection of linky goodness.
Bookmarks for Jul 07
A daily collection of linky goodness.
Web Worker Daily » Archive Design Patterns for Coworking «
Vaga | Ten by Twenty ™
TrackThis: Track FedEx/UPS/USPS/DHL Packages using Twitter (or Email, IM or SMS)
Bookmarks for Jul 06
A daily collection of linky goodness.
Feed Store :: Fail Whale
“This shirt will ship mid-July. We’ll notify you via Twitter, unless it’s down. Yeah… just come back here and check.
“…and if you’re looking for the ACTUAL Fail Whale stuff, there’s an Official Fan Club Store. You make enough with your Etsy craft store to buy from both of us.”
TweetDeck
Technology Review: Who Owns Your Friends?
MUSEO :: a Free Quality Font from exljbris
Diavlo :: a Free Quality Font from exljbris
Bookmarks for Jul 04
A daily collection of linky goodness.
Twitter: User Co-Creating or User Co-Opting? – O’Reilly Radar
Bookmarks for Jul 03
A daily collection of linky goodness.
“This’ll be the day that whales fly.”
The Fail Whale Fan Club
#fwh – Summize
Twitter / yiyinglu
Yiying Lu
The FAIL SNAIL on Flickr – Photo Sharing!
I am releasing this as public domain, anyone may use it as their error message or whatever else you want, including Flickr geo tagging it with Twitter’s office address.
sassholes: Museum Piece, Circa 2025
House Industries – Neutraface
Twitter, What Are You Doing? Co-Founder Tells All : NPR
Facebook | FailWhale
Twitter FailWhale Fan Club – FriendFeed
FriendFeed Comments WordPress Plugin – Development on a Shoestring
Feature request: OAuth in WordPress
In the past couple days, there’s been a bit of a dust-up about some changes coming to WordPress in 2.6 — namely disabling ATOM and XML-RPC APIs by default.
The argument is that this will make WordPress more secure out of the box — but the question is at what cost? And, is there a better solution to this problem rather than disabling features and functionality (even if only a small subset of users currently make use of these APIs) if the changes end up being short-sighted?
This topic hit the wp-xmlrpc mailing list where the conversation quickly devolved into spattering about SSL and other security related topics.
Allan Odgaard (creator TextMate, as far as I can tell!) even proposed inventing another authorization protocol.
Sigh.
There are a number of reasons why WordPress should adopt OAuth — and not just because we’re going to require it for DiSo.
Heck, Stephen Paul Weber already got OAuth + AtomPub working for WordPress, and has completed a basic OAuth plugin for WordPress. The pieces are nearly in place, not to mention the fact that OAuth will pretty much be essential if WordPress is going to adopt OpenID at some point down the road. It’s also going to be quite useful if folks want to post from, say, a Google Gadget or OpenSocial application (or similar) to a WordPress blog if the XML-RPC APIs are going to be off by default (given Google’s wholesale embrace of OAuth).
Now, fortunately, folks within Automattic are supportive of OAuth, including Matt and Lloyd.
There are plenty of benefits to going down this path, not to mention the ability to scope third party applications to certain permissions — like letting Facebook see your private posts but not edit or create new ones — or authorizing desktop applications to post new entries or upload photos or videos without having to remember your username and password (instead you’d type in your blog address — and it would discover the authorization endpoints using XRDS-Simple — Eran has more on discovery: Magic, People vs. Machines).
Anyway, WordPress and OAuth are natural complements, and with popular support and momentum behind the protocol, it’s tragic to see needless reinvention when so many modern applications have the same problem of delegated authorization.
I see this is a tremendous opportunity for both WordPress and OAuth and am looking forward to discussing this opportunity — at least consideration for WordPress 2.7 — and tonight’s meetup — for which I’m now late! Doh!
Bookmarks for Jul 01
A daily collection of linky goodness.
Highlight Author Comments
Terrell Russell: This Old Network : Summer of ‘08 – Part II
Life’s Work – A Shared Office Is a Great Escape From Working at Home – NYTimes.com
Bookmarks for Jun 30
A daily collection of linky goodness.
oohEmbed.com
Yahoo! Design Stencil Kit v1.0 (Yahoo! Developer Network blog)
What to do on an OAuth Permission page – IIW
XRDS Simple | drupal.org
XRDS-Simple is an important part of the DiSo project ( http://diso-project.org/) and used by OpenID and OAuth for service discovery.
The module exposes a single hook_xrds() that can be used by other modules to announce services via XRDS.
Embracing OpenID – PaulStamatiou.com
Shift
beSpacific: Secure web browsing with the OP web browser
the OP web browser, that attempts to improve the state-of-the-art in browser security. Our overall design approach is to combine operating system design principles with formal methods to design
a more secure web browser by drawing on the expertise of both communities. Our overall design philosophy is to partition the browser into smaller subsystems and make all communication between subsystems simple and explicit. At the core of our design is a small browser kernel that manages the browser subsystems and interposes on all communications between them to enforce
our new browser security features.”
Coding Horror: Please Give Us Your Email Password
DESKTOPOGRAPHY
In the wild snapshot#3: DiSo profile plugin « Ungeek DaPo
Finding Freedom at Work – TIME
XEN 1.0 profile
Make OpenID go away. | nathanpbell.com
InfoQ: OAuth Gaining Momentum
Aza’s Thoughts » Blog Archive » Firefox Mobile Concept Video
SproutCore » home
At the Forge – Integrating OpenID
Anivers :: a Free Quality Font from exljbris
OAuth – devdefined-tools – Google Code
Twitter Hashtags – Userscripts.org
Hueniverse: Explaining Discovery
SourceForge.net: SupraBrowser
SproutCore + Fluid = Wonderful Synergy | /dev/random
blog.reddit — what’s new on reddit: reddit goes open source
Don Park’s Daily Habit – Visual Security: 9-block IP Identification
Augmented Information Assimilation: Social and Algorithmic Web Aids for the Information Long Tail
The Adventures of Cindy Li | OAuth
Google data-sharing gets authentication option | Tech news blog – CNET News.com
SmugMug loves OAuth
Mashups: Google’s Adoption Makes oAuth a Must Have for All Apps – ReadWriteWeb
The Social Web TV pilot episode
http://www.viddler.com/player/2cf46be8/
My buddies John McCrea, Joseph Smarr have started up a show called The Social Web and have released the pilot episode, featuring David Recordon on the hubbub between Google and Facebook following last week’s Supernova Conference.
As they point out, things are changing and happening so fast in the industry that a show like this, that cuts through the FUD and marketing hype is really necessary. I hope to participate in future episodes — and would love to hear suggestions or recommendations for topics or guests for upcoming episodes.
Here’s the FriendFeed room Dave mentioned.
Announcing Emailtoid: mapping email addresses to OpenIDs
The other night at Beer and Blog in Portland, fellow Vidooper Michael T Richardson announced and launched a new service that I’m both excited and a little apprehensive about.
The service is called Emailtoid, and while I prefer to pronounce is “email-toyed”, others might pronounce it “email two eye-dee”. And depending on your pronunciation, you might realize that this service is about using an email address as an ID — specifically an OpenID.
This is not a new idea, and it’s one that been debated and discussed in the OpenID community an awful lot, which culminated in a rough outline of how it might work by Brad Fitzpatrick following the Social Graph FOO Camp this past spring, and that David Fuelling turned into an early draft spec.
Well, we looked at this work and this discussion and felt that sooner or later, in spite of all the benefits of using actual URLs for identity, that someone needed to take a lead and actually build out this concept so we have something real to banter about.
The pragmatic reality is that many people are comfortable using email addresses as their identity online for signing up to new services; furthermore, many, many more people have email addresses who don’t also have URLs or homepages that they call their own (or can readily identify). And forcing people to learn yet another form of identifier for the web to satisfy the design of a protocol for arguably marginal value with a lesser user experience also doesn’t make sense. Put another way: the limitations of the technology should not be forced on end users, especially when it doesn’t need to be. And that’s why Emailtoid is a necessary experiment towards advancing identity on the web.
How it works
Emailtoid is a very simple service, and in fact is designed for obsolescence. It’s meant as a fallback for now, enabling relying parties to accept email addresses as identifiers without requiring the generation of a new local password and without requiring the address owner to give up or reveal their existing email credentials (otherwise known as the “password anti-pattern“).
The flow works like this:
- Users enter either an OpenID or email address into a typical OpenID input field. For the purpose of this flow, we’ll presume an email address is used.
- The relying party splits email addresses at the ‘@’ symbol into the username and the domain, generating a directed identity request to the email domain. If an XRDS, YADIS or XRDS-Simple document is discovered at the domain, the typical OpenID flow is invoked.
- If no discovery document is found, the service falls back to Emailtoid (sending a request like http://emailtoid.net/mapper?email=jane@example.com), where users verify that they own the supplied email addresses by providing their one-time access token that Emailtoid mailed to them.
- At this point, users may optionally associate an existing OpenID with their email address, or use the OpenID auto-generated by Emailtoid. Emailtoid is not intended to serve as a full-featured OpenID provider, and we encourage using an OpenID from a third-party OpenID provider.
- In the case where users supply and verify their own OpenID, Emailtoid will create a 302 HTTP redirect removing Emailtoid from future interactions completely.
Should an email provider supply a discovery document after an Emailtoid mapping has been made, the new mapping will take precedence.
Opportunities and issues
The drive behind Emailtoid, again, is to reduce the friction of OpenID by reusing familiar identifiers (i.e. email addresses). Clearly the challenges of achieving OpenID adoption are not simply technological, and to a great degree rely on how the user experience needs to become more streamlined and deliver on the promise of greater security and convenience.
Therefore, if a service advertises that they support signing in with an email address, they must keep that promise.
Unfortunately, until all email providers do some kind of local resolution and OpenID authentication, we will need a centralized mapper such as Emailtoid to provide the fallback mapping. And therein lies the rub, defeating some of the distributed design of OpenID.
If anything, Emailtoid is intended to drive forward a conversation about the experience of OpenID, and about how we can make the protocol compatible with, or complementary to, existing and well-known means of identifying oneself on the web. Is it a final solution? Probably not — but it’s up, it’s running, it works and it forces us now to look critically at the question of emails as OpenIDs, now that we can actually experience the flow, and the feeling, of entering an email address into an OpenID box without ever having to enter, or create, another unnecessary password.

