<rss
      xmlns:atom="http://www.w3.org/2005/Atom"
      xmlns:media="http://search.yahoo.com/mrss/"
      xmlns:content="http://purl.org/rss/1.0/modules/content/"
      xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      version="2.0"
    >
      <channel>
        <title><![CDATA[Tim Bouma]]></title>
        <description><![CDATA[Tim Bouma @trbouma on Twitter. Let's see how this goes!]]></description>
        <link>https://tim-bouma.npub.pro/tag/chatgpt/</link>
        <atom:link href="https://tim-bouma.npub.pro/tag/chatgpt/rss/" rel="self" type="application/rss+xml"/>
        <itunes:new-feed-url>https://tim-bouma.npub.pro/tag/chatgpt/rss/</itunes:new-feed-url>
        <itunes:author><![CDATA[Tim Bouma]]></itunes:author>
        <itunes:subtitle><![CDATA[Tim Bouma @trbouma on Twitter. Let's see how this goes!]]></itunes:subtitle>
        <itunes:type>episodic</itunes:type>
        <itunes:owner>
          <itunes:name><![CDATA[Tim Bouma]]></itunes:name>
          <itunes:email><![CDATA[Tim Bouma]]></itunes:email>
        </itunes:owner>
            
      <pubDate>Thu, 10 Jul 2025 11:12:10 GMT</pubDate>
      <lastBuildDate>Thu, 10 Jul 2025 11:12:10 GMT</lastBuildDate>
      
      <itunes:image href="https://raw.githubusercontent.com/trbouma/assets/main/profile_pic_crop.png" />
      <image>
        <title><![CDATA[Tim Bouma]]></title>
        <link>https://tim-bouma.npub.pro/tag/chatgpt/</link>
        <url>https://raw.githubusercontent.com/trbouma/assets/main/profile_pic_crop.png</url>
      </image>
      <item>
      <title><![CDATA[Remember, OAuth 2.0 was designed…]]></title>
      <description><![CDATA[Remember, OAuth 2.0 was designed to facilitate login by the big digital platforms at the time. Security was pushed out of the protocol and left to the implementors to handle. In the words of one of the the former editors “a recipe for security disaster”. I’m not making…]]></description>
             <itunes:subtitle><![CDATA[Remember, OAuth 2.0 was designed to facilitate login by the big digital platforms at the time. Security was pushed out of the protocol and left to the implementors to handle. In the words of one of the the former editors “a recipe for security disaster”. I’m not making…]]></itunes:subtitle>
      <pubDate>Thu, 10 Jul 2025 11:12:10 GMT</pubDate>
      <link>https://tim-bouma.npub.pro/post/note1yuuft2qfqe96l565pvv5dmaxwdqlpme4gg5wpevuyue7srlqp5zqp7za0d/</link>
      <comments>https://tim-bouma.npub.pro/post/note1yuuft2qfqe96l565pvv5dmaxwdqlpme4gg5wpevuyue7srlqp5zqp7za0d/</comments>
      <guid isPermaLink="false">note1yuuft2qfqe96l565pvv5dmaxwdqlpme4gg5wpevuyue7srlqp5zqp7za0d</guid>
      <category>chatgpt</category>
      
      <noteId>note1yuuft2qfqe96l565pvv5dmaxwdqlpme4gg5wpevuyue7srlqp5zqp7za0d</noteId>
      <npub>npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5</npub>
      <dc:creator><![CDATA[Tim Bouma]]></dc:creator>
      <content:encoded><![CDATA[<p>Remember, OAuth 2.0 was designed to facilitate login by the big digital platforms at the time. Security was pushed out of the protocol and left to the implementors to handle. In the words of one of the the former editors “a recipe for security disaster”. I’m not making any claims, but as the world goes headlong into adopting a fundamentally insecure protocol for secure applications, I am keeping my eyes wide open.<br><br>I had <a href='/tag/chatgpt/'>#ChatGPT</a> help me write this little apercçu on OAuth 1.0 and OAuth 2.0<br><br>——-<br><br>OAuth 1.0 vs OAuth 2.0 — and the controversy that shook the standards world<br><br>Most developers today are familiar with OAuth 2.0 — the framework behind “Login with Google” or API access via bearer tokens. But fewer remember that OAuth 2.0 was born out of a rather dramatic evolution.<br><br>OAuth 1.0 was cryptographically secure by design. Every request was signed with HMAC-SHA1 (or RSA), ensuring message integrity and protecting against replay attacks — even over untrusted networks.<br><br>Then came OAuth 2.0: simpler, more flexible, better suited for mobile and public clients. But it also abandoned signatures in favor of bearer tokens and shifted all trust to HTTPS.<br><br>That shift sparked major controversy. In 2012, Eran Hammer — the editor of the OAuth 2.0 spec — publicly resigned from the working group, calling OAuth 2.0 “a bad protocol” and “a recipe for security disasters.”<br><br>His key criticisms:<br>	•	OAuth 2.0 was too open-ended — leading to fragmentation and non-interoperability<br>	•	It offloaded security to implementers, many of whom weren’t equipped for it<br>	•	It prioritized ease of implementation over protocol integrity<br><br>In time, the industry adopted OAuth 2.0 regardless — and patched in best practices like PKCE, refresh tokens, and token revocation. OAuth 2.1 (in draft) now seeks to consolidate these lessons.<br><br>But the controversy remains a powerful reminder:<br>Simplicity isn’t free. It often comes at the cost of security, clarity, or control.<br><br><a href='/tag/nostr/'>#nostr</a> is the way</p>
]]></content:encoded>
      <itunes:author><![CDATA[Tim Bouma]]></itunes:author>
      <itunes:summary><![CDATA[<p>Remember, OAuth 2.0 was designed to facilitate login by the big digital platforms at the time. Security was pushed out of the protocol and left to the implementors to handle. In the words of one of the the former editors “a recipe for security disaster”. I’m not making any claims, but as the world goes headlong into adopting a fundamentally insecure protocol for secure applications, I am keeping my eyes wide open.<br><br>I had <a href='/tag/chatgpt/'>#ChatGPT</a> help me write this little apercçu on OAuth 1.0 and OAuth 2.0<br><br>——-<br><br>OAuth 1.0 vs OAuth 2.0 — and the controversy that shook the standards world<br><br>Most developers today are familiar with OAuth 2.0 — the framework behind “Login with Google” or API access via bearer tokens. But fewer remember that OAuth 2.0 was born out of a rather dramatic evolution.<br><br>OAuth 1.0 was cryptographically secure by design. Every request was signed with HMAC-SHA1 (or RSA), ensuring message integrity and protecting against replay attacks — even over untrusted networks.<br><br>Then came OAuth 2.0: simpler, more flexible, better suited for mobile and public clients. But it also abandoned signatures in favor of bearer tokens and shifted all trust to HTTPS.<br><br>That shift sparked major controversy. In 2012, Eran Hammer — the editor of the OAuth 2.0 spec — publicly resigned from the working group, calling OAuth 2.0 “a bad protocol” and “a recipe for security disasters.”<br><br>His key criticisms:<br>	•	OAuth 2.0 was too open-ended — leading to fragmentation and non-interoperability<br>	•	It offloaded security to implementers, many of whom weren’t equipped for it<br>	•	It prioritized ease of implementation over protocol integrity<br><br>In time, the industry adopted OAuth 2.0 regardless — and patched in best practices like PKCE, refresh tokens, and token revocation. OAuth 2.1 (in draft) now seeks to consolidate these lessons.<br><br>But the controversy remains a powerful reminder:<br>Simplicity isn’t free. It often comes at the cost of security, clarity, or control.<br><br><a href='/tag/nostr/'>#nostr</a> is the way</p>
]]></itunes:summary>
      
      </item>
      
      <item>
      <title><![CDATA[Looking for names for this cute…]]></title>
      <description><![CDATA[Looking for names for this cute little #nostr #safebox character. So far these are the best from #ChatGPT. 

Open to suggestions!

🧙‍♂️ 3. The Rebel Courier

A sly, clever messenger who moves across borders and systems unnoticed.

Name Options:
    •	Rux – Rugged, off-grid, fast
    •	Nomix – A remix of the old ways…]]></description>
             <itunes:subtitle><![CDATA[Looking for names for this cute little #nostr #safebox character. So far these are the best from #ChatGPT. 

Open to suggestions!

🧙‍♂️ 3. The Rebel Courier

A sly, clever messenger who moves across borders and systems unnoticed.

Name Options:
    •	Rux – Rugged, off-grid, fast
    •	Nomix – A remix of the old ways…]]></itunes:subtitle>
      <pubDate>Mon, 07 Jul 2025 14:36:08 GMT</pubDate>
      <link>https://tim-bouma.npub.pro/post/note1r737dpqzssm0sf95xlw7tmzsf4lrm8a833k250rpy2c0s7lhwyrqkj86f9/</link>
      <comments>https://tim-bouma.npub.pro/post/note1r737dpqzssm0sf95xlw7tmzsf4lrm8a833k250rpy2c0s7lhwyrqkj86f9/</comments>
      <guid isPermaLink="false">note1r737dpqzssm0sf95xlw7tmzsf4lrm8a833k250rpy2c0s7lhwyrqkj86f9</guid>
      <category>nostr</category>
      
        <media:content url="https://image.nostr.build/d4507df1a995f7c9ea888741c50d6c7df3f4086828f6c25aff7027bb5146e282.jpg" medium="image"/>
        <enclosure 
          url="https://image.nostr.build/d4507df1a995f7c9ea888741c50d6c7df3f4086828f6c25aff7027bb5146e282.jpg" length="0" 
          type="image/jpeg" 
        />
      <noteId>note1r737dpqzssm0sf95xlw7tmzsf4lrm8a833k250rpy2c0s7lhwyrqkj86f9</noteId>
      <npub>npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5</npub>
      <dc:creator><![CDATA[Tim Bouma]]></dc:creator>
      <content:encoded><![CDATA[<p>Looking for names for this cute little <a href='/tag/nostr/'>#nostr</a> <a href='/tag/safebox/'>#safebox</a> character. So far these are the best from <a href='/tag/chatgpt/'>#ChatGPT</a>. <br><br>Open to suggestions!<br><br>🧙‍♂️ 3. The Rebel Courier<br><br>A sly, clever messenger who moves across borders and systems unnoticed.<br><br>Name Options:<br>	•	Rux – Rugged, off-grid, fast<br>	•	Nomix – A remix of the old ways<br>	•	Solo – Free agent, unstoppable<br>	•	Vixie – Playful, fast, cunning<br><br></p>
]]></content:encoded>
      <itunes:author><![CDATA[Tim Bouma]]></itunes:author>
      <itunes:summary><![CDATA[<p>Looking for names for this cute little <a href='/tag/nostr/'>#nostr</a> <a href='/tag/safebox/'>#safebox</a> character. So far these are the best from <a href='/tag/chatgpt/'>#ChatGPT</a>. <br><br>Open to suggestions!<br><br>🧙‍♂️ 3. The Rebel Courier<br><br>A sly, clever messenger who moves across borders and systems unnoticed.<br><br>Name Options:<br>	•	Rux – Rugged, off-grid, fast<br>	•	Nomix – A remix of the old ways<br>	•	Solo – Free agent, unstoppable<br>	•	Vixie – Playful, fast, cunning<br><br></p>
]]></itunes:summary>
      <itunes:image href="https://image.nostr.build/d4507df1a995f7c9ea888741c50d6c7df3f4086828f6c25aff7027bb5146e282.jpg"/>
      </item>
      
      </channel>
      </rss>
    