Supernet
How many dependencies do you need to turn on a light?
DRAFT v4
1. Introduction
Websites and platforms share a common technology stack, relying on components like BGP, IP, DNS, TCP, HTTP, and TLS. Beyond these, platforms often require numerous additional components to address challenges such as authentication, managing multiple servers, handling cookies, enabling push notifications, and more.
Much of this complexity is accidental. Layers of workarounds built atop limitations of previous workarounds. By rethinking and restructuring parts of this stack, we can significantly reduce this complexity.
Supernets simplify communication by using cryptographic hashes as their foundational element. Examples include Git, ATProtocol, Nostr, Bitcoin, and most blockchains. 1 Supernets aren’t a new concept, but existing approaches don’t quite capture their full potential. To do that, lets consider the possibility:
What if hashes became the lowest common denominator?
Linkspace is a low-level, general-purpose supernet designed for (local) communities using cryptographic hashes to give each piece of data a unique, addressable number. This approach differs fundamentally from today’s perspective, where the primary context of each messages is its destination address. While this change might seem minor, its implications are profound.
It is the difference between writing a destination on an envelope or writing it on the letter itself. While this change seems trivial the consequences are anything but.
This document explains how a network of people might turn a light bulb on and off. It compares our current stack to that of a supernet, while the organizational requirements slowly expand in each chapter.
At each additional level of complexity, the cost between the full HTTPS stack and the supernet grows. The HTTPS stack has bound authenticity into encryption, and each step multiplies the number of moving parts. The supernet has the option to make simpler and less is able to adapt better, as properties of every message is fixed regardless of the method of sending and receiving.
This basic example serves as an invitation: imagine applying the same concept to all our 'platforms'.
Supernets can also be seen as an upgrade of error detecting codes into cryptographically secure error detecting codes.
2. Turning on a light bulb
The main text supposes some background knowledge, but tries to be self contained. To run the code examples you'll need the latest linkspace library and cli.
These notes hold more complicated code snippets, or comments that assume additional knowledge.
Click here to either hide or focus them:
2.1. Turn on a light
Let's begin with a problem of practical size: How can we turn on a light? Like any good engineer solving a mission-critical challenge, consider the most important question first. Does this need anything more complicated than a physical light switch?
If - or when - the answer is yes, attaching a small computer to a switch can open up a world of possibilities.
Basic familiarity with a shell is required for the examples. The following can stand-in to simulate the light (Runnable on most modern linux systems2):
#!/bin/sh notify-send toggle "$1"
`notify-send` is available in most distributions. Saving it as ./toggle-light and `chmod +x ./toggle-light` should give you a notification whenever you run it.
The future examples use bash, the linkspace cli (`lk`) and python library, and socat. Socat is available in practically all package managers. Linkspace is also available as a Python and JavaScript package.
2.2. Turn on a light remotely
Someone before you has taken a tiny piece of sand and convinced it to be a computer controlling a light. It sits there waiting for any message to spread and reach it. Spreading a message requires a protocol.
2.2.1. TCP/IP: A steams of messages
No communication systems we have ever built reaches more people than TCP/IP. It provides developers with a magic dedicated wire able to transmit data to any other place given a number. TCP reads a stream of data and then cuts, wraps, transmits, receives, unwraps, and reorders the data at both ends. TCP can be thought of as a train pulling its carts through a tunnel. Data you put in each wagon eventually comes out the other side in the same order - or not at all. But physically - unbeknownst to many - the route and order of each wagon can differ while in transit. It is the IP address on each wagon that ensures they arrive.
It is this design that billions of people and hundreds of billions of devices use every day to send texts or swipe for another video.
The examples shown here can be run on two computers.
For practical (copy-paste) purposes everything assumes a single localhost where 127.0.0.1
is code could be run
on a computer controlling a lights and localhost
simulates remote commands.
Executing
socat TCP-LISTEN:8080,fork SYSTEM:"./toggle-lights.sh"
listens for anyone on the network wanting to toggle the light.
Anyone running echo toggle | socat - tcp-connect:192.168.1.5:8080
toggles the light.
Supernets take a different perspective. IP address become a secondary concern. Instead each wagon - including the routing address - gets a hash address. What that adds is the topic of the coming chapters.
First, considers that in many cases writing code that deals with continuous streams of data - instead of individual wagons - is preferable. That choice between stream or message does not matter when you're considering if a supernet is the right tool. The same bit of TCP code that split, unwrap, and reorder messages to form a stream works in a supernet 3 , providing the same abstraction, solving your problems.
Please take a moment to consider - as similar argument will be made multiple times: Adding a hash to the stack does not obstructs or limits how you go about solving problems. Existing system could continue to function as they are right now. Adding the hash enables new ideas, platforms, and designs. Or in other words - as i hope you'll agree at the end: The lack of an explicit hash is an obstruction to how you think about all your digital communication.
2.2.2. Linkspace datapoint
For practical purposes we'll stick with TCP/IP and use it to send a toggle
linkspace message.
In linkspace each message is a 'point'.
A points input determine its hash.
from linkspace import * point = lk_datapoint("toggle") print(point.data_str) print(point.hash)
toggle V85tNI6cNZKcGh5jeYjQXXCssWrlw8zWTRu5q3TcEYc
The entire document up to this sentence fills up ~ 1/10th of the maximum size of a datapoint.
A datapoint can hold up to maximum 216-512 bytes, around 65.000 bytes.
The hash identifying the data fills up this much memory: 00000000000000000000000000000000
.
The chances of getting the same hash twice by accident is measured in meaningless improbabilities;
such as twice guessing the same atom in the observable universe - at the same moment in time since the big bang.
The chances of getting the same hash with the same data are 100%.
Linkspace uses the BLAKE3 hash. A datapoint can hold up to 216-512 bytes.
After downloading Ensure the tools work and toggle the light bulb as follows:
- Wait for new messages;
socat tcp-listen:2020,fork EXEC:"lk do – toggle-light"
- Check if you can create points.
echo -n toggle | lk datapoint | lk format "[hash-str]"
- Send
echo -n toggle | lk datapoint | socat - tcp-connect:192.168.1.5:2020
Or similarly in Python:
import sys # `echo -n toggle | lk datapoint` point = lk_datapoint("toggle") pbytes = utils.lk_serialize(point) sys.stdout.buffer.write(pbytes) sys.stdout.buffer.flush() # wraps a Iterable[bytes] - like stdin or other socket - with lk_deserialize points = utils.lk_deserialize_stream(sys.stdin) # `| lk format "[hash:str]"` for point in points: print(str(point.hash))
2.3. Turn on multiple lights remotely
If one bulb was a bright idea, wouldn't a second be brighter?
Our messages should indicating which specific light bulb we want to toggle.
For example toggle-light living-room/table
or toggle-light garage/above-door
.
2.3.1. HTTP and text versus byte messages
The best known protocol that solves the problem is HTTP/TCP/IP. The hypertext transfer protocol ( HTTP ) wasn't the first solution, but it hit the right balance between powerful, fast, simple, and pretty.
When you open your browser to and use HTTP to visit http://192.168.1.5:8080/garage/above-door,
it opens a stream to 192.168.1.5:8080
and sends a header starting with GET /garage/above-door HTTP/1.1
.
The header field /garage/above-door
is the 'path'.
Reading this field in a HTTP stream can be used to toggle a light.
Linkspace does a similar thing with paths like /garage/above-door
, but it differs in a fundamental way.
2.3.2. Bytes and Text
HTTP Headers like GET ... HTTP/1.1
, are part of the message defined by a protocol.
The HTTP protocol defines the header and they must only contain valid text, and some values are not valid.
If a light is added with the name: 💡
, /
, or \0
( the 0 value ), then something somewhere is going to break.
To get around this limitation in HTTP its up to developers to pick an additional function like encodeURIComponent
or
a variant of base64
that encode/decode between (non-)valid text.
Hashes are 'random' numbers - not valid text. Instead of having this distinction of (non-)valid text, all linkspace's fields have a known length allowing for any data to be used.
This means that when you print a point's field like its hash or path, it will output whatever bytes those values hold.
printf "toggle" | lk datapoint | lk format -j "[hash][data]" | xxd
00000000: 57ce 6d34 8e9c 3592 9c1a 1e63 7988 d05d W.m4..5....cy..] 00000010: 70ac b16a e5c3 ccd6 4d1b b9ab 74dc 1187 p..j....M...t... 00000020: 746f 6767 6c65 toggle
A lot of programs expect text, and break if a field contains the number \0
.
The library contains a byte-templating language called ABE ( ASCII byte expressions ). When ABE has to print bytes it escapes the unprintable ASCII characters with \x00 as well as '\', '/', ':', ' ', and '[]'. ABE is not part of the linkspace protocol, but it is the normative way to interface between bytes and printable strings.
When it evaluates text like "my hash is [hash:str]", it replaces "[ ]". Most programming languages automatically 'print' the text encoded value for similar reasons.
print( [ byte for byte in point.hash ] ," are 32 bytes ") print(point.hash, "are 43 letters in base64 encoding " ) print(lka_eval2str("[hash:str]", point=point), "works using the library - but ABE's main usecase is the CLI")
[87, 206, 109, 52, 142, 156, 53, 146, 156, 26, 30, 99, 121, 136, 208, 93, 112, 172, 177, 106, 229, 195, 204, 214, 77, 27, 185, 171, 116, 220, 17, 135] are 32 bytes V85tNI6cNZKcGh5jeYjQXXCssWrlw8zWTRu5q3TcEYc are 43 letters in base64 encoding V85tNI6cNZKcGh5jeYjQXXCssWrlw8zWTRu5q3TcEYc works using the library - but ABE's main usecase is the CLI
2.3.3. A linkpoint
Linkspace also has the notion of a path. A datapoint only contains hash and data. a 'linkpoint' has additional fields besides the hash and data. One of those fields is the 'path'.
point = lk_linkpoint("", path=["garage","above-door"]) print(point.path_list) path ="/".join(point.path_str) print(path)
Unlike HTTP, path parts know their length and need no special characters.
That means they it can be garage
, \0
, 💡
, or /
.
It is also possible to do path=["reply",point.hash]
.
Had paths instead depended on special characters, the using of a point.hash in a path would force a choice of encoding functions, adding overhead and potential incompatibilities.
The light bulb server can listen with
socat TCP-LISTEN:8080
People in the network can use
lk linkpoint /garage/above-door | socat - tcp-connect:192.168.1.5:2020
Browsers don't talk linkspace like they talk HTTP just yet.
But there are some neat things possible. The linkspace library can run in the browser mostly just fine4. Building points is certainly possible with a webpage. web-sign is such a tool, opening ../web-sign&path=/garage/above-door&dest=192.168.1.5:2020 to send one-off linkspace messages.
The browser sends the linkspace point with HTTP POST.
To read the HTTP POST data replace socat with a script like lk-http-rx.sh
for example:
lk-http-rx.sh | lk do -e – 'toggle-light $path'
2.3.4. Stamp
A second field all linkspoints have is the 'stamp'. Its the current time in microseconds since UNIX epoch. It offers some ordering between points.
In the vast majority of cases you can trust the stamp's validity, especially when it is ordering points signed by one pubkey. But it is neither unique, nor a proof of ordering.
You'll need to consider the impact if a device starts faking its stamps. In the coming chapters we'll show how the `links` fields creates links between points by their hash. Unlike stamps, these links are indisputable proof that one point was created before another.
2.4. Turn on multiple lights remotely by you
You light up the room! - Sweet, but less so when it is everybody everybody including online strangers.
Next lets limit control of the light to a single person. Regardless of the method, library, or framework you decide on this will require (public-)key cryptography. Key cryptography works by doing a lot of math on a hash of a message. A hash which supernets have by definition.
The last kind of 'point' is the keypoint. These are signed linkpoints - with the same fields - and include a public key (i.e. pubkey) and signature.
The pubkey field is a number just like the hash. To determine if a message was created by you, simply check if the pubkey matches yours.
# create a new identity your_key = lki_generate() print("pubkey:", your_key.pubkey) # saving an (encrypted) key for later enckey = lki_encrypt(your_key,b"my password") print("enckey:", enckey) # opening the enckey your_key = lki_decrypt(enckey,b"my password") # Your message point = lk_keypoint(data="toggle", path=["garage","above-door"], key=your_key ) print("Authorized:", point.pubkey == your_key.pubkey) # some random message random = lk_linkpoint(data="toggle", path=["garage","above-door"]) print("Authorized:", random.pubkey == your_key.pubkey) random_signed = lk_keypoint(data="toggle", path=["garage","above-door"], key=lki_generate()) print("Authorized:", random_signed.pubkey == your_key.pubkey)
pubkey: gyrEXgybHDai4mcoKYsbKBOq83jM5qbxhXYFClwaEQU enckey: $lki$argon2d$v=19$m=19456,t=3,p=1$gyrEXgybHDai4mcoKYsbKBOq83jM5qbxhXYFClwaEQU$6v8tlCFTAuWI7kuGY_KsuOpqvSH3uKBFEjAozF5tqVo pre rest188 Required60 ucontentsize188 pre rest188 Required60 ucontentsize188 pre rest188 Required60 ucontentsize188 Authorized: True pre rest92 Required60 ucontentsize92 pre rest92 Required60 ucontentsize92 pre rest92 Required60 ucontentsize92 Authorized: False pre rest188 Required60 ucontentsize188 pre rest188 Required60 ucontentsize188 pre rest188 Required60 ucontentsize188 Authorized: False
If you've opened any of the web tools like web-sign, then it created such a key to use as your identity. Unlike a typical email & passwords identity, this key doesn't leave your computer and a remote service being hacked won't compromise your identity.
Using the library lkc_id_open
automatically generates/saves/opens a locally-saved encrypted key.
With the lk tool:
lk id generate --password "" > ./enckey # LK_ENCKEY is checked if a key is required and no other argument is given. export LK_ENCKEY=$(cat ./enckey) export MY_PUBKEY=$(cat ./enckey | lk id pubkey)
lk keypoint /garage/door | lk format [pubkey:str] => [path:str]
socat tcp-listen:8080 - \ | lk filter one-of pubkey -- "$MY_PUBKEY" "$OPTIONAL_OTHER_KEY..." \ | lk do -e -- 'toggle-light $path'
To keep using a browser you can use lk-http-rx.sh
instead of socat tcp-listen:8080 -
.
lk-http-rx.sh takes as its arguments a command to filter incoming points so you can lk-http-rx.sh lk filter one-of ....
launch a different server and lk-http-rx.sh ... | lk format [pubkey:str]
so you can have people 'sign up' with their key.
# save our previously created keys open("encrypted-keys.txt", "w").write(enckey+"\n") open("authorized.txt", "w").write(str(your_key.pubkey)+"\n") accept = PubKey( open("authorized.txt").read().strip() ) unsigned_linkpoint = lk_linkpoint(path=["this","doesn't","work"]) keypoint = lk_keypoint(key=your_key, path=["garage","door"]) for point in [ unsigned_linkpoint, keypoint]: if not point.pubkey == accept: print(f"DENIED: {point.path_str} by {point.pubkey}") continue # point.path_list is a list of parts bytes # point.path_str is a list of parts bytes encoded in ascii-byte format path = "/".join(point.path_str) # os.system(f"toggle-light {path}") print(f"toggle-light {path}")
pre rest92 Required60 ucontentsize86 pre rest92 Required60 ucontentsize86 pre rest180 Required60 ucontentsize176 pre rest180 Required60 ucontentsize176 pre rest92 Required60 ucontentsize86 pre rest92 Required60 ucontentsize86 pre rest92 Required60 ucontentsize86 DENIED: ['this', "doesn't", 'work'] by AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA pre rest180 Required60 ucontentsize176 pre rest180 Required60 ucontentsize176 toggle-light garage/door
2.4.1. Passwords
There are two types of passwords.
The first type is used to encrypt and save an identity. Such a password protects the identity so that even if it is stolen, no one can decrypt it or impersonate you without the corresponding password.
The second type of password is shared with others, allowing them to prove they know a specific code word to gain access.
In certain scenarios, the second type is appropriate. These passwords are simple, requiring minimal configuration, no accounts, and no account recovery processes. However, many systems take the naive approach of transmitting the password with every message. This is needlessly insecure.
A better approach is to use the password to generate an “ad hoc” key. With this method, both you and the system (“the light” in our example) use the password to derive the same key. This key is then used to sign a message, proving knowledge of the password without directly sharing it.
In Linkspace, this is accomplished with the lki_adhoc(…) function. This function takes a password and a context to generate such a key. The exact context is explained later.
2.4.2. Encrypting streams
The common approach with passwords, eg HTTP, is to send them with a message. A long time ago you could even just click http://username:password@127.0.0.1:8080/hello/world to do so. This was disabled in HTTP because it doesn't do encryption, and anybody on the network could see username:password.
If you upgrade to HTTPS ( i.e. SSL/HTTP/TCP/IP ) this still works, but 'upgrade' make it sound much more fun than it is. Installing it requires an extensive ritual, and a small donation.
Encrypting streams with HTTPS would add in a bunch of implicit dependencies, even though encryption wasn't even our goal.
It does let us hide the content of our messages, but this should be an orthoganal and standalone concern. Encryption between two end points is so cheap, simple, and common, that a message routinly are encrypted three or four times without noticing. [Wifi, VPN, SSH, HTTPS, Wireless]
(Ab)using encryption as the method of implied authenticity, instead of signatures, is dogma worth reconsidering.
Lets consider the set-up required behind the curtain. Its inner workings are difficult to parse, but the idea behind it is a good one: In the background HTTPS talks to a bunch of computers, this network of computers share messages that get hashed and cryptographically signed, creating links between them, creating a graph of mutually assured credibility that ties a name like https://example.com together with a public key for everybody. For various reasons this key-naming scheme is only used for servers, it costs money, and users shouldn't bother5.
2.4.3. Summary
At this moment we've encountered the private/public key. These are used to create 'keypoints'. Keypoints are proof that the points: data, public key, and other fields, were combined into a unit on a device holding the private key. The machine controlling the light is set up to only react to these kinds of points. A device without that specific private key is unable to create a point that toggles the light. Next we'll expand to consider what we'll need to support more people controlling the lights.
2.5. Turn on lights remotely by more people
First, let's separate out the similarities and differences between supernets and classic service. If you plan to set up a service for multiple people you'll have to deal with:
- Sign up
- Accounts management
- Password resets
- Usage limits
- other logic like controlling lights
It is what it is - specifically - it is of no interest right now.
To keep things focused we'll only deal with pubkeys.
## Previously: accept = PubKey( open("authorized.txt").read().strip() ) accept_set = { PubKey( line.strip() ) for line in open("authorized.txt").read()} for point in [ unsigned_linkpoint, keypoint]: ## Previously: if not point.pubkey == accept: if not point.pubkey in accept_set: print(f"DENIED: {point.path_str} by {point.pubkey}") continue path = "/".join(point.path_str) print(f"toggle-light {path}")
Now that we support multiple people controlling the light, it becomes time to consider the goal of our community. Should this light-bulb imperium have:
- a federation of light-bulb peers, creating a market of light bulbs
- a platform where people join up and you orchestrate & arbitrate light bulb access
In a supernet this becomes a real choice. Both are essentially the same thing, with the choice being made by limiting on where data flows and what is valid.
To upgrade from the first to the second, software checks pubkeys and links to determine if you've (in)directly vetted them. This is what your online (social media) 'feeds' are. A list of (in)directly vetted messages.
A system without hashes hits a dead end.
Option 2 can be made with much work ( touched on in next chapter ). Option 1 is entirely in the realm of 'theoretically possible fantasy".
2.5.1. Turn on different things by different people
Whichever you decide to build, linkspace has two more fields to make it practical for anyone and anything: the group and domain.
lp = lk_linkpoint(data="toggle", domain="example-💡".encode(), group=[0] * 32) # A group is 32 bytes. print(lp.group) # A domain is 16 bytes - left padded with \0 print(lp.domain.utf8()) # strip padding - read as utf8 print(str(lp.domain)) # with padding - ascii byte encoding
pre rest68 Required60 ucontentsize66 pre rest68 Required60 ucontentsize66 pre rest68 Required60 ucontentsize66 AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA pre rest68 Required60 ucontentsize66 example-💡 pre rest68 Required60 ucontentsize66 \0\0\0\0example-\xf0\x9f\x92\xa1
The group indicates the intended set of recipients. If none is provided the public group is used.
The linkspace library does not include build-in networking. It is up to the exchange method you choose to run that ensures groups do not leak data.
The domain separates one app from another. Domains can be thought of as port numbers, in that they indicate what kind of points to expect.
Together the (domain,group,path) determine a point's "space".
The CLI and various API's take a 'space' argument. This is "domain:group:/path-example/parts" Any component can be left off to use the default.
By convention:
- the all '0' bytes group is [#:private] (i.e. [#:0]) and is never transmitted.
- the '[#:pub]' group is the public group.
- datapoints are part of the public group6
lk linkpoint "domain:[#:pub]" | lk format "[group:str]"
WT0_F-AX2-wuZZ_K6Mm9BFmexjWVAoWDOADpfL1wws8
The context mentioned in the section on adhoc keys are the domain & group.
The default domain/group is taken from the LKE_DOMAIN / LKE_GROUP environment variables.
To change them in a running process use the environment functions ( lke*
) such as lke_set(domain="test",group=PRIVATE)
2.6. Turn on multiple lights remotely by people providing 'light bulb access'
For our light bulbs we'll sketch out a system where an 'admin' must grant permission slips to other people. The computer controlling our lights requires users first sends their permission followed by a toggle request.
2.6.1. Links
Supernets are systems where messages link to other messages by their hash. In linkspace this is the `links` field. Each link exists of {tag,ptr}. The ptr - or 'pointer' - is the hash number of a message, and the tag a word or value to indicate its relationship.
datap = lk_datapoint("toggle") hello_link = lk_linkpoint( "hello world", links=[("a link",datap.hash)] ) hello_signed = lk_keypoint("", key=key, links = [("first",datap),("second", hello_link.hash)]) print(hello_signed.links)
admin = lki_generate() request = lk_keypoint(path=["lamp","garage","above-door"], key=key) permission = lk_keypoint(key=admin, path=["permission", request.hash])
incoming_points = [permission,request] accepting = {} for point in incoming_points: if point.path0 == b"permission" and point.pubkey == admin.pubkey: ptr = point.links[0].ptr if ptr not in accepting: accepting[ptr] = True else if point.path0 == b"lamps": if ptr.hash in accepting and accepting[ptr] == True: accepting[ptr] = False # don't allow reuse path = "/".join(point.path_str[1:]) print(f"toggle-light {path}")
Assigning a meaning to paths and links is the art of designing code for supernets.
In our example two issues pop up. First, if the program stops it forgets its accepted requests. Secondly, if a permission arrives before a request it doesn't work.
Both can be solvable by saving points. The first by writing a new point after fulfilling the request indicating it has been handled, and the second by reading points we've saved.
Saving points can be as simple as reading/appending to a file with lk_serialize, lk_deserialize
.
Eventually though, walking through every message front to back becomes slower than keeping an index. Feel free to pick the database that works for you. The library includes one by default that keeps a log for receive order, and an index by hash and (group,domain,path,pubkey).
To search this database, or more generally request a set of points, the library contains the query struct. Queries let you add predicates, and can quickly select matching points. They are used to read & watch for new matches in the linkspace database, and when requesting data remotely.
Queries: lkq_new / lkq_add / ...
and lk filter query
Filtering: lkq_compile
and lk filter query
Database: lks_open() / lks_save / lks_[scan/watch/tap] / lks_process
and lk init / lk save / lks [scan/watch/tap]
3. Transitive Properties
Linkspace has a growing set of 'commons'. The commons use the core linkspace functions to build well known abstractions - such as the ability to send ordered streams, status/reply, address naming system, etc.
At the basic level, this lets us 'copy' known design patterns making linkspace at least as capable as any other design. At the more advanced level, this reduces complexity and lets you delete entire segments of a stack.
A reoccuring aspect is transitive message properties. That means, messages from Alice to Bob and then forwarded by Bob to Charlie, retain whatever makes them useful.
For instance, a request send by Alice, can be read and accepted by Bob, resolved by Charlie, and send back directly to Alice. Whereas today it is more common to have Bob implement different security procedures between both parties and act as a relay, eventually becoming a bottleneck themselves, requiring another round of increasing complexity to support multi-bob support. If at some point a 4th person wants to do something with the result given to Alice, and the complexity for Dave to trust the result given to Alice's explodes once more.
In contrast, linkspace makes this trivial.
Computers are routing machines all the way down. Transitive properties are a super power that lets you avoid needless complexity across the entire stack - from browsers, across servers, across organizations.
4. Salts & Cookies.
Lets briefly check in with the HTTPS system. There's two more problems. People keep sending your server their password in full, which you'll need to store with a salt. If you don't do this
- and do it right - you might get into trouble.
The second is cookies. HTTPS already uses key cryptography but your users keep throwing their pubkey away after each session. Give them a cookie and they'll keep that around.
Learning its quirks is a non trivial task. Finding a good online recipe that gets to the point, is like trying to find a good online recipe that gets to the point. If you've not stumbled on a good one, you'll eventually trip up when adding a second server. Either you add idiosyncratic constraints on server roles, or you take your cookies and mix in some public key cryptogr…
Wait, what problem are we solving again?
Alternatively, outsource some of it to a "Sign in with …" company. You've now also outsourced to them the power to turn off your lights.
5. The highlight of the story
The supernet is going strong, whereas the web is starting to show its constraints. The network encryption is annoying and costs money, and user sessions require baking with crypto. But it is still working. The strongest argument for HTTPS is its ubiquity, the stronger argument against: Its design is a dead end.
5.1. The problems of the web
It is time to put the spot light on the choice that lies ahead and confront the tragic farse that is modern platforms.
The HTTPS light imperium requires a new way to talk to others so it can push information to users. This can't be the stack we've used so far, as the stack doesn't let us call out. There are a few thousand options - off the shelf or custom build - so pick your poison. If mobile support becomes relevant, add in another third party service blessed with that power.
If you're familiar with the anatomy of mobile third-party notification providers, it should start to look familiar and their limitations frustrating.
Skipping the details lets walk through some systemic choices.
First designing the backend. As a giant tech companies you must always 'be online' and feel snappy for your users. This means developing a distributed message system, a message protocol that side-steps TCP streaming semantics, and identify each message through a unique number, as they move between servers and clients. Perhaps this number is a counter, one of your engineers might even suggests using a hash.
Your role in society plays out as follows:
Because the world runs on HTTP and users can't know each other, control over the light bulbs sits only with you. Critically, you'll want to brand yourself a platform. A descriptive term like "single point of failure" or "overlord" is bad PR. Lets meet halfway and say host-administrator.
As a host-administrator you'll control 4 "moats" to your fief. You'll own the users identity, grant/revoke access to the market, information about the market, and the communication between the users.
An exorbitant privilege that lets you manipulate prices, scare children and parents into paying attention, control who gets the most views, or whatever else pays most. Losing users is your greatest fear, so make sure users fear losing you. Imprint the story that losing you, means losing accesses to their community and everything they've shared.
Now for the bad news. You won't win this round of monopoly. Somebody else already did.
5.2. Host-administrator on a supernet
The exact same story told from the view of a supernet has a slightly different ring to it.
You own a platform controlling the light bulbs. Visiting users create their own pubkey to sign messages. You tell them to throw it away after each session.
Whenever a user tries to send a message to the community it is signed with their pubkey. Once you receive it, you strip the message of their key and resign it with your pubkey. When the next user visits, send them a list of pre-approved and (re)signed messages. As a bonus you'll tell them what is - or ought to be - popular today. You're the only source of truth on this.

This design works perfectly fine in a supernet, arguably better with less moving parts. The issue comes when the platforms changes strategy to exploiting users. Users might ask questions like:
- Why is the host striping all messages and resigning them under their key with fake identities?
- Why am I subscribed to 1 host-administrator controlling lists of "real" messages, and dictates what is worth spreading?
- Why can't I unsubscribe without leaving everything behind?
- Do I still have any control or ownership over the messages I send?
Unless you own a billion $ platform, these questions are worth asking right now.
Tags are 16 byte, left padded with '0' if not filled.
ABE can encode 16 bytes explicitly with [a:...]
.
lk eval "[a:hello]" | xxd
00000000: 0000 0000 0000 0000 0000 0068 656c 6c6f ...........hello
The ptr is any 32 byte, but should only be used for hashes. However, there is no rule that says hash pointers must only ever sit inside a `link.ptr` field. In some situations it makes sense to put a hash in the data or path.
The ptr are useful in that it is readable by any tool without understanding the rest.
Advanced Multi-user lk, ABE, and other mind binders
Instead of Python, we could stay with lk
by using some of its - and ABE's - advanced features.
The [b:....]
syntax evaluates a base 64 encoded string as bytes.
Generally the syntax is [ function : arg1 : arg2 ]
or [ arg1 / function : arg2 ]
lk eval "[b:$PUBKEY]" | xxd lk eval "[b:$PUBKEY/?b]"
lk eval [help]
~ for more.
By setting the LK_ENV_FILE environment variable the lk
can use the env
ABE function to read keys & values.
echo example:alice "[b:$PUBKEY]" > ./authorized_adhoc.txt echo example:bob "[adhoc:bobs-password]" >> ./authorized_adhoc.txt export LK_ENV_FILES=$PWD/authorized_adhoc.txt:/dev/null
Note that the value is the result of the []
expression, now accessible with:
lk eval [kv:example:bob] | xxd
lk eval [kv**:example] | xxd # all kv variables starting with :example
socat tcp-listen:8080 - | lk filter one-of pubkey -- "[kv**:example]" | lk do -e -- 'toggle-light $path' #or lk-http-rx.sh lk filter one-of pubkey -- "[kv**:example]" | lk do -e -- 'toggle-light $path'
6. In perspective
How is Linkspace different than other supernets, e.g. blockchain? Generally, blockchains are supernets with a specific purpose, strict rules for receiving and sending, and most have a 'head' where all messages must link into the public group, and all blocks of data are chained together. Linkspace has no such backed-in ideas, while making it trivial to use them if required for a specific application.
Here are some notes on what sets linkspace apart from similar projects.
- Toggling light bulbs requires few dependencies
- Not a framework - you call the library, not the other way around
- A fast hash - can stream video on a potato phone
- No json/base64 encoding / well aligned fields - simple in hardware
- Groups - not everything is in a public group
- No fixed dependency on TCP, IP, or any global network
- Domains - The focus is on being a generic tool, not solve 1 use case
If you're familiar with similar projects the biggest chance is that linkspace is low structure. It is low structure in various ways. There is no typing, no reverse link-lookup table build in, and no further protocol requirements beyond its cryptography. In the case of typing, historical attempts to make the one true typesystem / hierarchy don't succeeded, and having to figure out where they stopped is a needless distraction at this level of the stack.
For reverse link-lookup, i.e. an index to query "All links pointing to hash", is by definition incomplete. It is a costly to track locally with uncertain utility. Instead linkspace leaves this up to the application to create an index and tap for points of interest.
By having no protocol requirements - such as a global chain hardcoded into the library -, this provides similar freedom as with the early internet to figure out what works best in practice.
6.0.1.
Supernets won't magically fix the crazyness of billions of people shouting into the ether, but by considering its point of view, the supernet highlights the dark algorithms that have shaped much of the early century.
Beyond the faults of contemporary systems, supernets are worth doing for the shear possibilities. A few centuries ago the choice was learning to read or get told what has been written. Our moment in history is no less.
Supernets - linkspace or another - will move the world much the same. Every platform today takes an absurd toll on the communities that use them. The most efficient markets are those that freely spawn and change on demand, not take its participants hostage and lord over them. Hopefully, with the supernet perspective, people will wonder who they've ordained day in day out, and why. As such ideas flow through markets, politics, and power, they can reshape the future.
Footnotes:
ZFS is almost a supernet, while torrents are not, as their file structure messages are not hashed.
if you know a better supported example let me know
In linkspace one way to streams data is to use the lkc_stream* functions, and delivery can be acknowledged with lkc_reply*
The JS (wasm) API is mostly on par with Rust and Python
LNS is a system attempting a similar root-naming scheme in linkspace with at least one free top level domain.].
Datapoints being in the public group / null domain needs to consideration when transmitting. A linkpoint can be checked against the receivers access permission, datapoints can not. However, consider that the datapoint hash is a secret unless you share it. If you want to share the hash but keep the point 'contained' just use a linkpoint with proper group.