Comment by endisneigh
4 years ago
I’m not sure what your point is here - you could also create a new Google account per website or simply use an email address.
The author advocates using third party services such as meta mask, who would need to be trusted.
How do you implement it without any third party site.
If we are talking about likelihood it’s unlike you’d be banned from Microsoft/Facebook/Google for no reason too.
Furthermore as the administrator how you stop bad actors?
You have to trust MetaMask to some extent, like any software you run locally, but MetaMask never gains control of your keys or identities, it's just a tool for using them (obviously 99.9% of users aren't auditing the code or building from source, but that's a totally different threat model). If MetaMask stops working for you, you can use a different tool with the same keys. If Google stops working for you you cannot transfer your account to Microsoft or Facebook.
> If we are talking about likelihood it’s unlike you’d be banned from Microsoft/Facebook/Google for no reason too.
I've seen posts on this forum about it. It happens and there's not much you can do if it does.
> you could also create a new Google account per website or simply use an email address.
> Furthermore as the administrator how you stop bad actors?
Apologies if I'm missing something, if it's easy to spin up unique identities on both what's the difference here? It seems like it would be one or the other.
And yes you can create a new Google account per website, but you are still at Google's mercy to authenticate. My 1Password has ~250 logins, I'd be seriously worried about a ban from Google if I made 250 accounts.
> Apologies if I'm missing something, if it's easy to spin up unique identities on both what's the difference here? It seems like it would be one or the other.
Yes except for a centralized entity the admin would have recourse. How does a web server admin deal with it in the case of blockchain?
> I've seen posts on this forum about it. It happens and there's not much you can do if it does.
If we are talking about anecdotes I’ve seen people lose their private keys to phishing and consequently all of their money, so…
> You have to trust MetaMask to some extent, like any software you run locally, but MetaMask never gains control of your keys or identities, it's just a tool for using them (obviously 99.9% of users aren't auditing the code or building from source, but that's a totally different threat model). If MetaMask stops working for you, you can use a different tool with the same keys. If Google stops working for you you cannot transfer your account to Microsoft or Facebook.
This is not true, depending on implementation. Even if we accept what you’re saying as true you can run your own oauth server.
Basically it seems the entirety of your argument rests upon trusting a centralized service. However the scenarios posited by the author are ones where blockchain is used to login to a centralized service to begin with so I don’t understand the criticism. Furthermore, unless one is to accept the infinite possibility and quantity of accounts, inevitably just like most other identity services, blacklists will be created.
If that is not effective then blockchain will simply not be an option for most sites.
Ultimately this convoluted web3 is no better than using an email address forwarder and a regular email and password.
> Yes except for a centralized entity the admin would have recourse.
Can you be more specific? How is it easier to sniff out a user using multiple emails vs multiple keys?
> If we are talking about anecdotes I’ve seen people lose their private keys to phishing and consequently all of their money, so…
Losing your keys is a huge problem that needs to be solved. I think social recovery is super promising in that respect but you're right that we aren't there yet. Phishing exists in both worlds, although I'd argue for logins specifically it's less of an issue in the MetaMask world, as you do not need to expose your private keys for that. You need to expose your password to log into Google.
> This is not true, depending on implementation. Even if we accept what you’re saying as true you can run your own oauth server.
Which part isn't true?
There is..some difficulty gap between a browser extension and running your own authentication infra..
9 replies →
Anecdotal but I've been using gmail for ~15 years and I've never heard of anyone (that I personally know) being banned by Google. Seems like a far-fetched scenario for the average person.