HN
Today

Use Protocols, Not Services

This piece argues passionately for a return to open protocols over centralized services, asserting that only protocols can offer true privacy, anonymity, and resistance to censorship. It highlights how services become easy targets for governmental and corporate control, while protocols' decentralized nature makes them resilient. The Hacker News crowd largely agrees, diving into practical examples and discussing the nuances of decentralized identity.

58
Score
7
Comments
#2
Highest Rank
4h
on Front Page
First Seen
Feb 16, 7:00 PM
Last Seen
Feb 16, 10:00 PM
Rank Over Time
251520

The Lowdown

The internet, originally designed for anonymity and privacy, has been undermined by the centralization of communication onto closed platforms. This piece argues that to reclaim these foundational properties, users must pivot from relying on centralized services back to utilizing open protocols.

  • Services are Vulnerable: Centralized services present a single point of failure and control. Governments and corporations can easily compel these entities to identify users, censor content, or enforce policies, as seen with age verification mandates.
  • Switching Services is Futile: Migrating from one centralized service to another offers no lasting solution, as new services will eventually face the same pressures or be blocked. It merely shifts dependency from one regulable entity to another.
  • Protocols Offer Resilience: Unlike services, protocols like IRC, XMPP, ActivityPub, Nostr, or Matrix lack a single entity to compel. A government would face an impossible task trying to pressure thousands of independent operators across multiple jurisdictions. The article uses email (SMTP) as an example, illustrating how its protocol-based nature allows users to switch providers while maintaining connectivity, even if major players become problematic.

Ultimately, the author contends that choosing a service over a protocol means willingly opting into a system where a single company can be forced to identify, restrict, or surrender user data, often to the detriment of user privacy and freedom.

The Gossip

Protocol Power & Persistence

Commenters strongly endorse the article's core premise, sharing real-world examples of how protocols offer resilience. The Freenode to Libera migration is cited as a prime example where a community, leveraging an open protocol (IRC), successfully mitigated an attempted hostile takeover by simply relocating to a new set of servers. This underscores how interoperability, often overlooked, is paramount for user freedom.

Decentralized Identity Dilemmas

While agreeing with the resilience of protocols like email, some users highlight a significant remaining challenge: decentralized identity. If an email provider bans a user, their established identity (email address) can still be lost, even if the protocol itself remains functional. The discussion extends to potential solutions, with domain names being suggested as a form of persistent identity, albeit with their own centralized vulnerabilities, and ATProto's identity solution being mentioned as a more robust alternative.

XMPP's Unsung Utility

A notable theme centers around XMPP as a particularly strong contender for a modern, decentralized communication protocol. One commenter, who has been building an XMPP client, champions its extensibility and historical use by major platforms like Google and Facebook. They argue that XMPP's XML-based structure and extensibility make it uniquely suited to incorporate modern messaging features without compromising its core decentralized design, positioning it as a superior alternative to services like Discord.