Re: Trust.txt: Why another random .txt when we've got WebFinger and well-known URIs?

Hello,

Sounds like this is the issue in this group. Lots of politics and
disagreements and not enough constructive movement towards tangible
outcomes.

Thanks,

Adeel

On Mon, 2 Aug 2021 at 02:10, Scott Yates <scott@journallist.net> wrote:

> You wrote:
>
> I believe it appropriate for this group to analyze a wide variety of
> implementations, existing standards, proposals, etc.
>
>
> Yes!!!
>
> That is my platform, and that is what I think we should do for trust.txt, *and
> for dozens of other initiatives.*
>
> I'm just saying that we should do that in a systematic way, and not in an
> email thread prompted by a new candidate for the chair. Let's do it in a
> way that the people behind each initiative and the broader community can
> all learn from the analysis.
>
>
> -Scott Yates
> Founder
> JournalList.net, caretaker of the trust.txt framework
> 202-742-6842
> Short Video Explanation of trust.txt <https://youtu.be/lunOBapQxpU>
>
>
> On Sun, Aug 1, 2021 at 6:54 PM Bob Wyman <bob@wyman.us> wrote:
>
>> You wrote:
>>
>>> "If you think trust.txt should be run differently, that's fine, but it's
>>> not at all related to the CredWeb group."
>>
>> I believe that CredWeb can and should learn from both the good and bad
>> design decisions that have been made by all others who are attempting or
>> have attempted to address the credibility problem. While I may have framed
>> my comments as criticisms or observations concerning a specific effort,
>> trust.txt, my intent is not actually to speak to the developers or
>> advocates of trust.txt itself, but rather to discuss these things in the
>> context of what CredWeb seeks to do.
>>
>> A question I've raised before on this list is "Who should publish
>> signals?" Well, the trust.txt spec gives one answer to that in that it has
>> found it useful for publishers to make claims about their own services.
>> Also, trust.txt provides at least one answer to the question: "Where should
>> the signals be published?" Trust.txt says: "In a web-accessible file,
>> having a specific format, in a well-known location." These are
>> useful answers to important questions that I believe should be considered
>> further. Trust.txt has also answered the question: "What signals are
>> useful?" and it has produced answers that are very different from those in
>> the CredWeb documents. CredWeb should consider those additional signals and
>> also wonder why trust.txt didn't independently identify the same signals
>> that CredWeb did. (What was different in the approach of problem definition
>> that motivated the differences in the identified signals?) Nonetheless,
>> trust.txt's specification includes some details that I think are
>> non-optimal. There is almost always good with bad, but we can, and should,
>> learn from both.
>>
>> I believe it appropriate for this group to analyze a wide variety of
>> implementations, existing standards, proposals, etc.
>>
>> bob wyman
>>
>>
>> On Sun, Aug 1, 2021 at 8:08 PM Scott Yates <scott@journallist.net> wrote:
>>
>>> Bob,
>>>
>>> All due respect, but I think your comments are best addressed to me as
>>> the founder of JournalList, and not to the entire CredWeb group.
>>>
>>> CredWeb has no authority over the trust.txt spec. Similarly, I am not
>>> running in hopes that trust.txt will take over the CredWeb.
>>>
>>> I am running for the chair of the CredWeb in the same way that I might
>>> run for the school board or a local museum board. I hope to do good work in
>>> a field that I am interested in, and I have some capacity to contribute. I
>>> also have a vision of what I think could be a very useful tool for the
>>> entire spectrum of those fighting disinformation.
>>>
>>> If you think trust.txt should be run differently, that's fine, but it's
>>> not at all related to the CredWeb group.
>>>
>>> -Scott Yates
>>> Founder
>>> JournalList.net, caretaker of the trust.txt framework
>>> 202-742-6842
>>> Short Video Explanation of trust.txt <https://youtu.be/lunOBapQxpU>
>>>
>>>
>>> On Sun, Aug 1, 2021 at 5:20 PM Bob Wyman <bob@wyman.us> wrote:
>>>
>>>> You wrote:
>>>>
>>>>> "On page 8 of the spec., we encourage the use of "/well-known" so we
>>>>> are clearly not against that." (link added)
>>>>
>>>> The trust.txt spec
>>>> <https://journallist.net/reference-document-for-trust-txt-specifications>
>>>> says, on page 8:
>>>>
>>>>> "In addition to the access method noted above, use of the “Well Known
>>>>> Uniform Resource Identifiers” is recommended."
>>>>
>>>> So, the spec says that providing the file with a "/.well-known/" prefix
>>>> is optional and should only be done if the file has also been provided
>>>> without a prefix. As a result, there is absolutely no utility in having a
>>>> copy of the file prefixed by "/.well-known/." Any smart coder would simply
>>>> ignore that there might be a second copy of the file. In fact, one might
>>>> argue that if a "well-known" file is found, but an unprefixed one is not
>>>> found, the prefixed copy should be ignored since it may be that the site's
>>>> intent was to delete the file, and they simply forgot to delete its copy.
>>>> In any case, it is generally not a good idea, when defining protocols, to
>>>> require or even recommend that data be provided in more than one place. The
>>>> typical statement is something like: "If data is found in more than one
>>>> place, it is probably wrong in all of them..."
>>>>
>>>> It would be very useful if the spec could be updated to *require* that
>>>> only one copy of the file should be provided and that it should be provided
>>>> with the "/.well-known/" prefix.
>>>>
>>>> Also, you wrote:
>>>>
>>>>> "The short answer to why we went with a text file is that we are
>>>>> working with some extremely unsophisticated publishers."
>>>>
>>>> I sympathize with your concern for the unsophisticated publisher.
>>>> However, any difficulty that might exist in the production of a more
>>>> complex file would be easily overcome by providing a trivial web form that
>>>> allowed "fill-in-the-blank" simplicity. The produced file could then be
>>>> simply copied to the appropriate location. After all, we've moved beyond
>>>> the time when everyone was expected to be able to edit files manually.
>>>> Publishers deal daily with xml, html, css, js, pdf, etc. files that only a
>>>> masochist would seek to edit by hand. Anyone with enough capacity to
>>>> maintain the Hays Free Press <https://haysfreepress.com/> site, is
>>>> savvy enough to either produce a WebFinger file on their own or to copy
>>>> the output from a simple web form.
>>>>
>>>> Allowing protocols to be limited to the low-bar of "unsophisticated"
>>>> users means that we're not able to provide "sophisticated" solutions when
>>>> they are needed. Over decades of experience with protocol and data format
>>>> design, we've learned that simple approaches inevitably lose their charm
>>>> after they have been in the field for some time. Users inevitably discover
>>>> new capabilities that they want to support. Requirements that were once
>>>> quite simple and well understood tend to become more complex and subtle as
>>>> time passes. Rather than waiting to discover the inadequacies of simple
>>>> formats, it makes a great deal of sense to initially rely on well-known
>>>> standard formats that allow extension, versioning, etc. Most "protocol
>>>> definers" should be focused on how to extend or exploit existing formats
>>>> while leaving the job of format definition to others who specialize in such
>>>> problems.
>>>>
>>>> For instance, the W3C Credible Web Community Group
>>>> <https://www.w3.org/community/credibility/> has defined a number of
>>>> signals that, I assume, a site might wish to self-assert in a discoverable,
>>>> well-known location. However, none of these signals are supported by the
>>>> trust.txt format. It seems to me that these signals could be usefully
>>>> included in a WebFinger file. These signals include:
>>>>
>>>>    - Date Website First Archived
>>>>    - Corrections Policy
>>>>    - Any Award
>>>>    - Pulitzer Prize Recognition
>>>>    - RNG Awards
>>>>
>>>> The choice here is: Should we call for trust.txt to be updated to
>>>> include these signals, and any others that might be defined in the future,
>>>> or, should we simply provide definitions of the JSON Resource Descriptors
>>>> (JRD's) or other encodings and thus, by implication enable those signals to
>>>> be supported in any format that supports those encodings? I suggest that
>>>> the more useful approach is to define what the signals mean and how they
>>>> should be encoded and then rely others to find the various places where
>>>> those encodings would be most useful. I this approach had been used in
>>>> defining trust.txt, then all the various signals supported there, which are
>>>> not defined by CredWeb, would be easily used by anyone who is also using
>>>> CredWeb signals. (Being able to say: "I control the website xxx.xxx." is
>>>> useful in more contexts than just that defined by trust.txt.)
>>>>
>>>> bob wyman
>>>>
>>>>
>>>> On Sun, Aug 1, 2021 at 2:58 PM Scott Yates <scott@journallist.net>
>>>> wrote:
>>>>
>>>>> Bob, and the group...
>>>>>
>>>>> Just to be clear, I am not running on a platform of trust.txt.
>>>>>
>>>>> On page 8 of the spec., we encourage the use of "/well-known" so we
>>>>> are clearly not against that.
>>>>>
>>>>> The short answer to why we went with a text file is that we are
>>>>> working with some extremely unsophisticated publishers. Take, for instance,
>>>>> the publisher of the Hays Free Press, whom I met recently in Texas. She
>>>>> prints news from her town on paper once a week, and maintains a website. As
>>>>> we all know, when local news dies, news consumers fill in that vacuum with
>>>>> crap. If she stops publishing, well, it would be bad, so we want to make
>>>>> things as easy as possible for her and those like her doing the esteemable
>>>>> work of keeping local journalism alive.
>>>>>
>>>>> In my conversation with her, she was willing to post a file
>>>>> <https://haysfreepress.com/trust.txt> in part because she already
>>>>> knew about ads.txt, and so this was familiar to her. If I tried to start
>>>>> telling her about RFC 7033, I would have lost her for sure. You are
>>>>> certainly right that JRDs would be technically superior, but robots.txt has
>>>>> been around for 20+ years and the most entry-level web publisher knows
>>>>> about how it works.
>>>>>
>>>>>
>>>>> Thank you for looking into trust.txt, and while I don't want people to
>>>>> vote for me based on what they think of trust.txt, I think your question
>>>>> serves as a useful model of why I am running. If you think that any new
>>>>> proposal that is working to fix disinformation should follow, for example,
>>>>> the most current standardized systems, you should voice that to the group.
>>>>> If the group agrees, then that will be a part of how trust.txt -- and every
>>>>> other effort out there -- will be evaluated.
>>>>>
>>>>> -Scott Yates
>>>>> Founder
>>>>> JournalList.net, caretaker of the trust.txt framework
>>>>> 202-742-6842
>>>>> Short Video Explanation of trust.txt <https://youtu.be/lunOBapQxpU>
>>>>>
>>>>>
>>>>> On Sun, Aug 1, 2021 at 11:53 AM Bob Wyman <bob@wyman.us> wrote:
>>>>>
>>>>>> Scott Yates, in his statement of candidacy
>>>>>> <https://lists.w3.org/Archives/Public/public-credibility/2021Aug/0000.html>,
>>>>>> includes a description of the trust.txt file
>>>>>> <https://journallist.net/reference-document-for-trust-txt-specifications>
>>>>>> .
>>>>>>
>>>>>> Please explain why it makes sense to introduce yet-another .txt file
>>>>>> (in addition to robots.txt and ads.txt) when we have established procedures
>>>>>> to allow those who control URIs to make statements supported by that
>>>>>> control. For instance, RFC 5785
>>>>>> <https://datatracker.ietf.org/doc/html/rfc5785> defines the
>>>>>> "/.well-known/" path prefix for "well-known locations" which are accessed
>>>>>> via URIs. It seems to me that if one were to publish a trust.txt file, then
>>>>>> it should be at the location "/.well-known/trust.txt" That does not seem to
>>>>>> be the current proposal. Why are existing standards not being followed?
>>>>>>
>>>>>> It also seems to me that the proposed file format is an unnecessary
>>>>>> departure from existing standards such as RFC 7033
>>>>>> <https://datatracker.ietf.org/doc/html/rfc7033>, which defined
>>>>>> WebFinger, a mechanism that could be easily used to carry the data which
>>>>>> the proponents of trust.txt seek to make available. To make WebFinger do
>>>>>> what trust.txt intends, it would be only necessary to register a few new
>>>>>> JSON Resource Descriptors (JRDs), properties, or link-relations (i.e.
>>>>>> belong-to, control, social, member, etc.). This sort of extension is
>>>>>> provided for in the definition of RFC 7033 and in RFC 5988
>>>>>> <https://datatracker.ietf.org/doc/html/rfc5988>, which defines "Web
>>>>>> Linking" mechanisms. Note: The existing set of defined link-relations can
>>>>>> be found in the IANA maintained link-relations registry
>>>>>> <https://www.iana.org/assignments/link-relations/link-relations.xhtml>
>>>>>> .
>>>>>>
>>>>>> While there will be a never-ending need to add support for new kinds
>>>>>> of standardized statements, discoverable in well-known locations, I think
>>>>>> we should be careful to ensure that new kinds of statements make use of
>>>>>> existing standards rather than define entirely new mechanisms. I can't see
>>>>>> anything in the trust.txt specification that actually requires a unique,
>>>>>> non-standard approach that is not already supported by the various
>>>>>> standards referenced above.
>>>>>>
>>>>>> bob wyman
>>>>>>
>>>>>>

-- 
Thanks,

Adeel Ahmad
m: (+44) 7721724715
e: aahmad1811@gmail.com

Received on Monday, 2 August 2021 01:23:59 UTC