Almost 5k π letβs get there today - tell your friends!
π«π· On passe les 5,000 aujourdβhui? Parlez dβEurosky Γ vos amis!
πͺπΈ ΒΏLlegamos a 5,000 hoy? Β‘CuΓ©ntaselo a tus amigos!
π©πͺ Schaffen wir heute 5,000? ErzΓ€hlt euren Freunden von Eurosky!
π³π± Halen we vandaag de 5,000? Vertel je vrienden over Eurosky!
06.03.2026 15:13
π 215
π 117
π¬ 9
π 15
We're rolling out a change in image format.
If you see some images taking a second to load today, that's expected.
06.03.2026 13:47
π 51
π 10
π¬ 4
π 1
these cookies are secure, http-only, strict.
03.03.2026 04:47
π 2
π 0
π¬ 0
π 0
Blacksky
Decentralized social media built for community power, culture, and collective freedom.
The blacksky.community web application now uses our own API servers to load posts, timelines and profiles.
When data is missing (accounts on the edges of the network, outside of our primary community, etc) we leverage @microcosm.blue
02.03.2026 17:01
π 315
π 105
π¬ 12
π 16
Congrats to the team @tangled.org!
02.03.2026 19:26
π 1198
π 94
π¬ 53
π 15
huge! congrats @tangled.org :)
02.03.2026 15:40
π 36
π 1
π¬ 0
π 0
however, authenticity of a did:web document hinges on possession of a private key too: it happens to be the private key held on the web server required for tls! so server-held keys end up having their role in each approach.
01.03.2026 05:48
π 3
π 0
π¬ 0
π 0
so with plc there is a set of "rotation keys" that can be used to manage the content of your did doc. within your did doc is the public key used to sign your repo.
with did:web there's no specific mechanism to manage your did doc, you just update the file where it's hosted however you like.
01.03.2026 05:48
π 1
π 0
π¬ 1
π 0
the did is that point of indirection: behind it is your handle, your pds, and your signing key. there are different ways you can manage your did. did:web ties it to a domain, perhaps most compatible with what you're looking for. did:plc ties it to possession of one in a set of keys.
01.03.2026 05:48
π 1
π 0
π¬ 1
π 0
intent is for handles to be able to change w/o breaking references to your identity or records. the did is the stable identifier. the pds typically manages key material on the user's behalf, but your pds and keys can change over time. so self-hosters manage keys, but most will just use a provider.
01.03.2026 04:44
π 1
π 0
π¬ 1
π 0
despite the term "commit" there is no concept of commit history in your repo (e.g. unlike git). the repo reflects only the current state of all your records, and through the one signature on the root provides cryptographic proof of each record.
01.03.2026 03:53
π 3
π 0
π¬ 0
π 0
exactly, signing over the root provides proofs down to each leaf. your did doc advertises your public signing key and your pds. your pds hosts the repo, but anyone else can also redistribute it. the data is "live" so long as it's signed by you. if your key changes, just sign again and distribute!
01.03.2026 03:53
π 2
π 0
π¬ 1
π 0
you can totally rotate your key and resign your repo without causing any disruption, changing any at uris for your posts, etc.
28.02.2026 23:04
π 4
π 0
π¬ 0
π 0
re: plc read replicas and auditing, worth following along with @bad-example.com who has been getting several regional ones going.
28.02.2026 20:30
π 5
π 0
π¬ 0
π 0
for your pds you could totally setup did:web identities, which are also supported in atproto. that would be neat!
28.02.2026 20:25
π 2
π 0
π¬ 1
π 0
yeah it was looked atβ in fact every existing did method at the time was considered! you may already be aware, but did:plc entries are self-certifying and there's a story for credible exit if needed. read replicas that audit the directory recently released, and more plans ahead!
28.02.2026 20:25
π 1
π 0
π¬ 1
π 0
a stuffed animal wearing sunglasses and a shirt is sitting at a keyboard .
Alt: a stuffed animal wearing sunglasses and a shirt is sitting at a keyboard .
I'm building on atproto because building infrastructure like "Drafts and Scheduled Posts for every atproto app" is easy as 1-2-3 and as cool as alf.
Announcing alf, the atproto Latency Fabric: leaflet.pub/p/did:plc:3v...
27.02.2026 20:09
π 103
π 18
π¬ 8
π 9
(that change happened just this week.)
27.02.2026 05:24
π 1
π 0
π¬ 0
π 0
i knowww. i think it was the api stability signaled by nodejs. i think things should change now that it moved up a level in stability to "release candidate." pumped to get this going in the pds.
27.02.2026 05:23
π 8
π 0
π¬ 1
π 0
Permissioned Data Diary 2: Buckets
The second in a series of posts building up a solution to permissioned data on atproto. We introduce buckets: a new protocol primitive for creating a shared social context.
new blog post on permissioned data in atproto! this one introduces "buckets", the protocol-level primitive for shared access control. I walk through two approaches that don't quite work and land on something that I think does
let me know your thoughts!
26.02.2026 18:12
π 285
π 58
π¬ 19
π 22
this rules! it would fit so nicely with atproto pds hosting, and very possibly jibe well with standard.site.
26.02.2026 03:56
π 6
π 0
π¬ 1
π 0
The promise of ATproto is social media without corporate overlords
YouTube video by CodeTV
What even is the AT Protocol?
@jason.energy and I talked about @atproto.com and what the future of social media can look like, where users are in control and developers are given more interoperability opportunities
25.02.2026 11:25
π 46
π 15
π¬ 0
π 0
this was my similar, borderline shitpost-quality protocol diagram bsky.app/profile/divy...
25.02.2026 16:57
π 1
π 0
π¬ 0
π 0
also nods towards what would make a *reeeeally great* relay? in my view it's all about more sophisticated network abuse prevention.
24.02.2026 22:56
π 2
π 0
π¬ 1
π 0
i could see that, totally! no shade on that approachβi thought it was a great call out that sync 1.1 is end-to-end. i think it is a little non-obvious to folks who haven't followed along closely, and this was a good chance to highlight it.
24.02.2026 22:54
π 2
π 0
π¬ 1
π 0
yes! sync 1.1 leans into the end-to-end principle: end consumers (e.g. apps) perform their own verification. technically relays don't have to!
but what makes a *great* atproto relay? a great relay protects consumers from garbage and network abuse, which is why indigo/relay verifies the events.
24.02.2026 22:36
π 30
π 2
π¬ 1
π 0