Baldemoto🇵🇸's Avatar

Baldemoto🇵🇸

@baldemo.to

🏳️‍⚧️They/Any🏳️‍⚧️ 23 📍PhD Student @ Berkeley 🌁 🔬Molecular & Cell Biology🧬 🦊 @furryli.st moderator🐱 PFP/💜: @halcyandaze.art In dark times, should the stars also go out?

1,998
Followers
999
Following
4,863
Posts
12.06.2023
Joined
Posts Following

Latest posts by Baldemoto🇵🇸 @baldemo.to

leafie making a variety of expressions: confused, angsty, snarky, ANGST, hurt but smiling about it, and the face she makes when she drinks alcohol (it tastes yucky)

leafie making a variety of expressions: confused, angsty, snarky, ANGST, hurt but smiling about it, and the face she makes when she drinks alcohol (it tastes yucky)

yeah yeah and I'm alright
I took a sip of something poison but I'll hold on tight

07.03.2026 01:31 👍 126 🔁 22 💬 0 📌 0

Read part 3 here:

07.03.2026 06:02 👍 1 🔁 0 💬 0 📌 0

It is. It’s a social problem. And technical infrastructure should not try to solve it. It *should* try to reflect it meaningfully as it would exist in real life, though. In other words, define social structures as a composite of individual relations, rather than as server-side infrastructure.

07.03.2026 01:34 👍 1 🔁 0 💬 0 📌 0

I think making systems where individual components naturally compose to a centralized structure, and where severing one individual relation causes a minimal or recoverable loss on either side, is a good middle ground between “complete centralization” and “complete distribution”

07.03.2026 01:31 👍 1 🔁 0 💬 0 📌 0

I dont think this can be meaningfully resolved. Incumbency & centralization has its advantages. Rather than fighting against it, we should analyze the roles of the central authority, deconstruct them, and recompose them as bounded, auditable relations where severing one doesnt compromise the whole

07.03.2026 01:27 👍 1 🔁 0 💬 2 📌 0

Fair enough! Keep up the good work

07.03.2026 01:04 👍 1 🔁 0 💬 0 📌 0
Preview
Composable Trust, Part 2: Separating Trust from Governance - Eclectic Corvine Muses ”Who belongs” and “What belonging means” are different questions. What happens if one steward stops answering both?

I don’t think this is the right framework to think about this problem.

07.03.2026 01:01 👍 1 🔁 0 💬 1 📌 0

🫡
I’ll be talking about the proposal during part of my presentation at ATmosphereconf if you’re interested in hearing more

07.03.2026 00:50 👍 2 🔁 0 💬 1 📌 0

*embedded signatures for credentials, not signed records

07.03.2026 00:47 👍 0 🔁 0 💬 0 📌 0

An XRPC endpoint for credential issuance would be nice for future privacy applications but not strictly required for experimenting, since the signed credential could just be embedded in a public record

07.03.2026 00:42 👍 3 🔁 0 💬 1 📌 0

Not much tbh! The only unorthodox part is signed records. Beyond that, the rest is built on what the protocol already has. The architecture is deliberately designed to need as little new protocol surface as possible

07.03.2026 00:39 👍 2 🔁 0 💬 2 📌 0

It takes advantage of the tendency centralization to converge communities towards a service with an architecturally limited mandate. From there, community infrastructure is populated by services that scopes to those credentials and perform the work of defining community spaces, and all it entails

07.03.2026 00:30 👍 2 🔁 0 💬 1 📌 0

The architecture separates low-frequency high-stakes decisions from high-frequency low-stakes decisions. Bad decisions from one layer creates back-pressure from other layers toward good governance through effects on trust relations and credible exit.

07.03.2026 00:27 👍 2 🔁 0 💬 1 📌 0

tl;dr: make membership an irrevocable credential, like a DID. Allow credential issuers to make labeler-esque “withdrawals” for members they no longer trust. Services have the final say on who does or doesn’t belong.

07.03.2026 00:27 👍 2 🔁 0 💬 1 📌 0

one of the clearest gaps in the ecosystem - working against the lofty decentralisation goals - is how power concentrates in tools: lists/feeds/labellers

the implicit decision by bsky rn is "don't let these things become powerful", which also means "don't let these things become *too* useful"

06.03.2026 23:28 👍 33 🔁 3 💬 1 📌 0

Yesterday’s world seems just so far away from these days

06.03.2026 16:57 👍 5 🔁 0 💬 0 📌 0

Part 4 will probably take a few more days, since it’s dealing with a categorically different problem set than the first 2 parts (UX and reconstituting the architecture into something recognizable). But I’m pretty excited about how it’s going!

06.03.2026 16:23 👍 0 🔁 0 💬 0 📌 0

Online communities are always reduced to the same structure: Stewards as Landlords

Part 3 of Composable Trust wields ATProto to architect a solution: decomposing communities into 3 sovereigns—Members, Rosters, and Venues—each with full jurisdiction over their own domain, and none over each other’s.

04.03.2026 22:07 👍 13 🔁 7 💬 2 📌 2
Preview
AtmosphereConf Sponsor: Google Open Source The Google Open Source team is supporting the conference as a Major Sponsor

Thank you to Google @opensource.google for joining #AtmosphereConf as a major sponsor! We appreciate your support!

06.03.2026 01:17 👍 256 🔁 39 💬 16 📌 16
Post image
05.03.2026 17:38 👍 6 🔁 0 💬 0 📌 0

Ahh, my bad! Yes, this makes sense, actually. I think it’s a good distinction to make, especially once the proposal gets to initial specifications!

05.03.2026 01:36 👍 0 🔁 0 💬 0 📌 0

It’s essentially the PLC ledger dependency, just one layer up haha

05.03.2026 00:49 👍 1 🔁 0 💬 0 📌 0

Where this “Roster Authority” service would live outside of simply an AppView, I haven’t given much thought to. Even if credentials are *initially* published publicly by a Roster, It’s probably still too heavy of a burden to expect every service to provide

05.03.2026 00:48 👍 1 🔁 0 💬 1 📌 0

One could plausibly factor out a “scope set” calculation service which indexes credentials, interprets Venue credential policies, subtracts users removed from the scope set from the Cluster, and returns a list of in-scope users. Such a service would have no hard dependency on the Roster itself

05.03.2026 00:37 👍 1 🔁 0 💬 1 📌 0

The trust set could be defined as the totality of the cluster - Roster “untrust” records. Since the untrust records are just signals that are interpreted by changes in the downstream’s scope, there is not a strict need for persistence.

05.03.2026 00:30 👍 1 🔁 0 💬 1 📌 0

Not at all! There’s actually no strict need for the Roster to maintain a central registry. An AppView could index credentials as part of their existing indexing work. “Lack of signal” != “Lack of entry”

05.03.2026 00:30 👍 1 🔁 0 💬 2 📌 0

Good catch!

04.03.2026 22:47 👍 0 🔁 0 💬 1 📌 0

Since this is the technical heart of the proposal:

@bnewbold.net I would really like to hear your thoughts on this

@kandake.africa, @bmann.ca, and @knowtheory.net, I think your inputs on the safety and privacy implications of such a system would be really important before any implementation.

04.03.2026 22:07 👍 2 🔁 0 💬 0 📌 0

Online communities are always reduced to the same structure: Stewards as Landlords

Part 3 of Composable Trust wields ATProto to architect a solution: decomposing communities into 3 sovereigns—Members, Rosters, and Venues—each with full jurisdiction over their own domain, and none over each other’s.

04.03.2026 22:07 👍 13 🔁 7 💬 2 📌 2
Preview
Composable Trust, Part 2: Separating Trust from Governance ”Who belongs” and “What belonging means” are different questions. What happens if one steward stops answering both?

In Part 2:

To enable credible exit, ATproto deconstructed the “Platform” into independent layers with bounded authority.

Yet in online communities, a single steward necessarily becomes a single point of failure.

How can we deconstruct the *community* Atmospherically? What happens if we do?

03.03.2026 22:03 👍 18 🔁 6 💬 3 📌 3