Michael Muré
michaelmure.bsky.social
Michael Muré
@michaelmure.bsky.social
It's public if you want to play with it: cad.onshape.com/documents/04...
Onshape
Sign in to Onshape, the #1 fastest growing CAD system in the world.
cad.onshape.com
January 4, 2026 at 10:03 PM
Cool list :-)

I'll take the occasion to ask a slightly different question: what do you think is the paper (recent or not) with the most practical potential, to do something better or novel? In particular in the realm of protocols, but feel free to extend further.
December 11, 2025 at 12:59 PM
Another cool thing is that because all the crypto and DID verification methods included, it's quite easy to add more DID types. Implementing did:web took 2h.

The hard part was to figure out that the examples in the spec are invalid.
August 5, 2025 at 2:42 PM
This crypto package could be split into its own thing if there is interest. Do you think that's useful standalone?
August 5, 2025 at 2:40 PM
In particular, it contains all the cryptographic handling to make it dead easy to consume DIDs, validate signatures and so on.

If you tried to use different key types with the go standard crypto library, you know it's a minefield of mismatched API.

github.com/MetaMask/go-... fix it.
August 5, 2025 at 2:39 PM
This could also be used to explain a codebase:
- start from some entry point question
- get a break down of the data flow or call graph
- click around to get more details
- asks more about language feature, pattern, capability, dependencies ...
July 26, 2025 at 7:57 AM
Disclaimer: no idea if that actually makes sense.
June 17, 2025 at 11:17 PM
I suppose the high dimentionality would make the index less compact, but maybe techniques like principal component analysis could compress that space, yet retain enough information for full-text search?
June 17, 2025 at 11:16 PM
Funny that we reconnect like that. Thanks @bmann.ca for being that social catalyst once again!
May 15, 2025 at 4:17 PM
I'm not too familiar with it (yet), but why not use Verifiable Credentials, that comes often in DID systems and is heavily standardized, instead of rolling your own format? As I understand it's more or less the same thing: a signed claim.
April 20, 2025 at 8:34 PM
There is also a token container (with a spec) that abstract the encoding and optional compression. Great to fit into a HTTP header or other medium.
April 20, 2025 at 11:32 AM
FYI, I have some tooling around go-ucan to apply UCAN policies on HTTP request parameters (host, path, query ...) or JSON-RPC ... that I plan to migrate into go-ucan. The idea is to have a somewhat standard way to apply UCAN on pre-existing HTTP APIs. It'd be great to be all on the same page.
April 20, 2025 at 11:31 AM
Definitely agree on the "centralized" aspect.

About the certificate logs, as did:plc has a chain of signed operations containing all the data ... isn't that already a certificate log? Could you expand your thought?
April 7, 2025 at 8:51 AM