zlacker

[parent] [thread] 17 comments
1. abraco+(OP)[view] [source] 2026-02-08 17:42:48
Isn't it extremely difficult problem? It's very easy to game, vouch 1 entity that will invite lots of bad actors
replies(6): >>DJBunn+r >>smotch+F >>dboon+L1 >>hobofa+P1 >>speps+t2 >>mjr00+J3
2. DJBunn+r[view] [source] 2026-02-08 17:45:35
>>abraco+(OP)
Indeed, it's relatively impossible without ties to real world identity.
replies(1): >>mjr00+p2
3. smotch+F[view] [source] 2026-02-08 17:46:36
>>abraco+(OP)
you can't really build a perfect system, the goal would be to limit bad actors as much as possible.
4. dboon+L1[view] [source] 2026-02-08 17:53:28
>>abraco+(OP)
You can't get perfection. The constraints / stakes are softer with what Mitchell is trying to solve i.e. it's not a big deal if one slips through. That being said, it's not hard to denounce the tree of folks rooted at the original bad actor.
replies(1): >>anupam+c7
5. hobofa+P1[view] [source] 2026-02-08 17:53:38
>>abraco+(OP)
Then you would just un-vouch them? I don't see how its easy to game on that front.
replies(1): >>Yizahi+bK
◧◩
6. mjr00+p2[view] [source] [discussion] 2026-02-08 17:58:07
>>DJBunn+r
> Indeed, it's relatively impossible without ties to real world identity.

I don't think that's true? The goal of vouch isn't to say "@linus_torvalds is Linus Torvalds" it's to say "@linus_torvalds is a legitimate contributor an not an AI slopper/spammer". It's not vouching for their real world identity, or that they're a good person, or that they'll never add malware to their repositories. It's just vouching for the most basic level of "when this person puts out a PR it's not AI slop".

replies(1): >>DJBunn+Sh
7. speps+t2[view] [source] 2026-02-08 17:58:53
>>abraco+(OP)
The usual way of solving this is to make the voucher responsible as well if any bad actor is banned. That adds a layer of stake in the game.
replies(2): >>supriy+Z6 >>bsimps+Ra
8. mjr00+J3[view] [source] 2026-02-08 18:06:21
>>abraco+(OP)
At a technical level it's straightforward. Repo maintainers maintain their own vouch/denouncelists. Your maintainers are assumed to be good actors who can vouch for new contributors. If your maintainers aren't good actors, that's a whole other problem. From reading the docs, you can delegate vouching to newly vouched users, as well, but this isn't a requirement.

The problem is at the social level. People will not want to maintain their own vouch/denounce lists because they're lazy. Which means if this takes off, there will be centrally maintained vouchlists. Which, if you've been on the internet for any amount of time, you can instantly imagine will lead to the formation of cliques and vouchlist drama.

◧◩
9. supriy+Z6[view] [source] [discussion] 2026-02-08 18:28:34
>>speps+t2
A practical example of this can be seen in lobsters invite system, where if too many of the invitee accounts post spam, the inviter is also banned.
replies(2): >>iugtmk+Sa >>Yizahi+wJ
◧◩
10. anupam+c7[view] [source] [discussion] 2026-02-08 18:30:12
>>dboon+L1
> The interesting failure mode isn’t just “one bad actor slips through”, it’s provenance: if you want to > “denounce the tree rooted at a bad actor”, you need to record where a vouch came from (maintainer X, > imported list Y, date, reason), otherwise revocation turns into manual whack-a-mole. > > Keeping the file format minimal is good, but I’d want at least optional provenance in the details field > (or a sidecar) so you can do bulk revocations and audits.
◧◩
11. bsimps+Ra[view] [source] [discussion] 2026-02-08 18:55:21
>>speps+t2
That's putting weight on the other end of the scale. Why would you want to stake your reputation on an internet stranger based on a few PRs?
replies(1): >>63stac+Lb
◧◩◪
12. iugtmk+Sa[view] [source] [discussion] 2026-02-08 18:55:21
>>supriy+Z6
I think this is the inevitable reality for future FOSS. Github will be degraded, but any real development will be moved behind closed doors and invite only walls.
◧◩◪
13. 63stac+Lb[view] [source] [discussion] 2026-02-08 19:02:18
>>bsimps+Ra
You are not supposed to vouch for strangers, system working as intended.
◧◩◪
14. DJBunn+Sh[view] [source] [discussion] 2026-02-08 19:39:31
>>mjr00+p2
That’s not the point.

Point is: when @lt100, @lt101, … , @lt999 all vouch for something, it’s worthless.

replies(2): >>jen20+Bo >>Dylan1+Ac1
◧◩◪◨
15. jen20+Bo[view] [source] [discussion] 2026-02-08 20:22:59
>>DJBunn+Sh
But surely then a maintainer notices what has happened, and resolves the problem?
◧◩◪
16. Yizahi+wJ[view] [source] [discussion] 2026-02-08 22:56:32
>>supriy+Z6
And another practical observation is that not many people have Lobsters account or even heard about it due to that (way less than people who heard about HN). Their "solution" is to make newcomers beg for invites in some chat. Guess what would a motivated malicious actor would do any times required and a regular internet user won't bother? Yeah, that.
◧◩
17. Yizahi+bK[view] [source] [discussion] 2026-02-08 23:00:14
>>hobofa+P1
Malicious "enabler" already in the circular vouch system would then vouch for new malicious accounts and then unvouch after those are accepted, hiding the connection. So then someone would need to manually monitor the logs for every state change of all vouch pairs. Fun :)
◧◩◪◨
18. Dylan1+Ac1[view] [source] [discussion] 2026-02-09 03:28:42
>>DJBunn+Sh
Real world identity isn't sufficient or necessary to solve that problem.
[go to top]