8 Matching Annotations
  1. Mar 2023
    1. Protocols are, by their very nature, open. If you can't read the protocol specification then you can't very well implement it, can you?
    2. As others pointed out, OATH's claims of "open source" have little meaning when compared to other authentication protocols such as SAML. When you include the entire Liberty Alliance specifications as well as the Web Services Initiative protocols and methods (as devised by Microsoft and IBM) there's nary a proprietary bit of code involved. Actually, there's no code involved at all. Protocols are, by their very nature, open. If you can't read the protocol specification then you can't very well implement it, can you?
  2. Mar 2021
  3. Jul 2020
    1. Syncthing uses an open and documented protocol, and likewise the security mechanisms in use are well defined and visible in the source code. Resilio Sync uses an undocumented, closed protocol with unknown security properties.
  4. Jun 2020
    1. Syncthing uses an open and documented protocol, and likewise the security mechanisms in use are well defined and visible in the source code. Resilio Sync uses an undocumented, closed protocol with unknown security properties.
  5. May 2020
  6. Apr 2020
    1. During the first era of the internet — from the 1980s through the early 2000s — internet services were built on open protocols that were controlled by the internet community. This meant that people or organizations could grow their internet presence knowing the rules of the game wouldn’t change later on.
    2. During the first era of the internet — from the 1980s through the early 2000s — internet services were built on open protocols that were controlled by the internet community