https://www.byjp.me
If there's a way I can help by testing (I have access to macOS/Linux/Windows), by contributing code (modulo my inexperience with Nix and Rust 😅), or otherwise I'd be very happy to.
If there's a way I can help by testing (I have access to macOS/Linux/Windows), by contributing code (modulo my inexperience with Nix and Rust 😅), or otherwise I'd be very happy to.
- Great for flights/travelling 😍
- Great for communities with low bandwidth 🤩
- Great for flights/travelling 😍
- Great for communities with low bandwidth 🤩
If an app can't clearly explain why it needs access to write (or delete) records under a given root NSID then that's a useful red flag in itself, no? (This is exactly like optionally approving scopes for OAuth apps today)
If an app can't clearly explain why it needs access to write (or delete) records under a given root NSID then that's a useful red flag in itself, no? (This is exactly like optionally approving scopes for OAuth apps today)
- …default to *on* if the referring domain matches ant specified as allowed in the Lexicon
(This hasn't been well thought through; but roughly?)
- …default to *on* if the referring domain matches ant specified as allowed in the Lexicon
(This hasn't been well thought through; but roughly?)
- When you auth you request read, r+write, or rw+delete permissions for each NSID 'root' (eg. com.atproto, app.bsky)
- your PDS OAuth landing page offers a toggle for each, *defaulting to off* (cos no-one reads)
- BUT…
- When you auth you request read, r+write, or rw+delete permissions for each NSID 'root' (eg. com.atproto, app.bsky)
- your PDS OAuth landing page offers a toggle for each, *defaulting to off* (cos no-one reads)
- BUT…
If you’re ever looking for an Easter egg to implement, may I humbly offer one I’ve been sitting on for 15 years now…
vimeo.com/9632924
If you’re ever looking for an Easter egg to implement, may I humbly offer one I’ve been sitting on for 15 years now…
vimeo.com/9632924
I was expecting (as I build my own ATProto app) that I’d need to approve write access to NSIDs not matching the domain; but presenting a well informed choice would be tough!
I was expecting (as I build my own ATProto app) that I’d need to approve write access to NSIDs not matching the domain; but presenting a well informed choice would be tough!
I agree about filesystems, though macOS (at least) does now go to some lengths to sandbox apps (eg. DaisyDisk can’t see my entire file system unless I specifically give it permission, or drop a folder on it to give it permission there)
I agree about filesystems, though macOS (at least) does now go to some lengths to sandbox apps (eg. DaisyDisk can’t see my entire file system unless I specifically give it permission, or drop a folder on it to give it permission there)
Would you consider a one-time payment, over a subscription?
I find one-offs much easier to justify for things I want to orient around (otherwise I don’t commit, cos the subscription feels like my flow being held hostage!)
Would you consider a one-time payment, over a subscription?
I find one-offs much easier to justify for things I want to orient around (otherwise I don’t commit, cos the subscription feels like my flow being held hostage!)