-
# New Work Item Proposal:
This is a new Work Item Proposal in response to the Digital Identity Guidelines as published under NIST 800-63-3, mentioned by Nader Helmy to the [mailing list on July 22…
-
A user can flag inappropriate of messages. Conditions of hiding messages should be implemented. For example, the message will be hidden if at least be flagged by 2 individuals.
The user of the flag…
-
For anyone not yet aware the official [privacy policy](https://www.audacityteam.org/about/desktop-privacy-notice/) was updated on the 2nd of July and contains some very disturbing things, most notably…
-
> organizations which design systems ... are constrained to produce designs which are copies of the communication structures of these organizations
>
> — Mel Conway
This law also works in reverse. Y…
-
@serejandmyself We need to discuss which metrics must be used for leaderboard
-
I've seen the shiny new Twitter account. I think GTG should also have a Mastodon account.
I've spotted two FLOSS specific instances :
https://floss.social/about (where GNOME masto account is) and ht…
ploum updated
4 years ago
-
Nomadic identity(implemented by Hubzilla) seems like the ideal implementation for identity the decentralized social networks.
From their [wiki](https://project.hubzilla.org/wiki/hubzilla/Hubzilla%2…
-
@bshambaugh - thanks for engaging. This is not an urgent request, but if you could start comparing EISPP to the current state of this openvocab/ovn effort, I think it would be interesting and useful. …
-
Capturing very early just to let it brew slowly in our minds. Since we deal with agreements, trust relations etc. We need to make sure people can rely on technology they use. Some relevant work in thi…
-
The [matrix protocol](http://matrix.org/docs/spec/) has emerged as the 3rd iteration of and future direction of the IRC protocol. This protocol was developed independently of the freenode-based IRCv3 …