Flickr doesn't seem to have a problem with the OAuth formula, so why are
people thinking twitter will?

 In addition, part of the concern I would have with Basic Auth is the
plaintext password. Sure, it's Base64 encoded, but that's not encryption,
that's just saving bandwidth. If twitter wanted to move to a different auth
scheme, that might work. Or they could add ssl to the API front end, and use
HTTPS, which is also expensive (either expensive SSL-offloading proxies, or
you have to lock a session to a server). I don't think Twitter should keep a
Basic Auth service. It just wouldn't be worth the risk to me.

JD

On Thu, Feb 5, 2009 at 12:02 PM, jstrellner <jstrell...@urltrends.com>wrote:

>
> Stuart ,
>
> In my first reply to this subject, I indicated that it could be a paid
> model for them, and I still think it could.
>
> Either way, I see them needing to use a key of some sort for desktop
> applications.  Twitter would still need to be involved though, if you
> want to prevent sharing of said key and you want the user to be able
> to revoke it.
>
> -Joel
>
> On Feb 5, 11:48 am, Stuart <stut...@gmail.com> wrote:
> > 2009/2/5 jstrellner <jstrell...@urltrends.com>:
> >
> >
> >
> > > I am not suggesting that they endorse the application, but that they
> > > have a process that is available to desktop apps that lets them keep
> > > using Basic Auth.  Once twitter has OK'd the app, then that app can
> > > display a badge of some sort letting its users know that they have an
> > > agreement directly with Twitter that makes it OK to enter your
> > > username/password.  I would think that part of the process of approval
> > > would include a contract of some sort that specifies exactly what the
> > > app can do with that data.
> >
> > For a free service? Not very likely. It would be prohibitively
> > expensive for Twitter to implement something where they underwrite a
> > trust relationship between users and application developers. If
> > application developers had to pay for it then maybe there is scope for
> > that to be put in place, but doing so would exclude the vast majority
> > of devs working with the API.
> >
> > Personally I'd vote for users being able to manually request a token
> > which they then provide to the application. That effectively bypasses
> > the OAuth authorisation mechanism while still providing many of the
> > same benefits. Each key would need to be tied to the application in
> > some way so it couldn't be shared, but I'm sure there's a solution in
> > there somewhere.
> >
> > -Stuart
> >
> >
> >
> > > On Feb 5, 8:48 am, Stuart <stut...@gmail.com> wrote:
> > >> 2009/2/5 jstrellner <jstrell...@urltrends.com>:
> >
> > >> > I was just thinking this, and then I read your post.  It would be
> good
> > >> > to see a "trusted apps" section somewhere on your site, and those
> > >> > application could use Basic Auth.  If they don't want to go through
> > >> > the process of being a trusted app, then they can use OAuth.
> >
> > >> > Just something to think about.  Could earn twitter some $$$ too.
> >
> > >> Could also land them in a world of pain. I wouldn't want Twitter to
> > >> endorse any product that wasn't theirs, and I doubt they would want to
> > >> either. Too risky.
> >
> > >> -Stuart
> >
> > >> > On Feb 4, 8:57 pm, Alex Payne <a...@twitter.com> wrote:
> > >> >> Thanks for the feedback, guys. We'll consider extending Basic
> Auth's
> > >> >> life, or maybe granting a "stay of execution" to known-good apps.
> At the
> > >> >> very least, we'll try not to pull the rug out from under anyone.
> >
> > >> >> funkatron wrote:
> > >> >> > Agreed. I do believe that the use of HTTP Basic Auth was key to
> the
> > >> >> > quick growth of the 3rd-party app community of Twitter, as the
> auth
> > >> >> > scheme is so well-understood and supported. This may or may not
> be as
> > >> >> > important at this point business-wise, as I suspect the Twitter
> > >> >> > userbase is large enough to overcome a fair bit of lazy user
> intertia.
> > >> >> > I wonder if we will see a lot less interesting API hacking (the
> good
> > >> >> > kind), though, and I think that would be a shame.
> >
> > >> >> > While OAuth makes a ton of sense for website-based apps, it's
> kind of
> > >> >> > another kettle of fish for locally-hosted apps (desktop and
> mobile).
> > >> >> > Moving to OAuth-only is problematic for us for these reasons:
> >
> > >> >> > 1. it complicates (and confuses) the process for users: instead
> of
> > >> >> > entering a username and password -- a well-understood, common
> process
> > >> >> > -- now the app has to push the user to a web site which hopefully
> > >> >> > explains what's going on decently. This works okay for web dorks
> like
> > >> >> > us, but I guarantee your avg user is going to find this
> confusing.
> > >> >> > Maybe not as confusing as OpenID, though.
> >
> > >> >> > 2. updating locally-hosted apps to use a new authentication
> system is
> > >> >> > an issue of getting thousands (or higher orders) of users to
> upgrade.
> > >> >> > 6 months may not be enough, even for currently active
> applications.
> > >> >> > Stuff in development *cough*like mine*cough* now could find
> themselves
> > >> >> > having to toss out a ton of code they're knee-deep in right now.
> > >> >> > Yucky.
> >
> > >> >> > My preference would be to *not* see HTTP Basic Auth go away in
> the
> > >> >> > foreseeable future.  If that's not reasonable or possible, the
> 6-month
> > >> >> > window (even given that the "countdown" may not start for a few
> > >> >> > months) is pretty tight for comfort, and extending it would be
> much
> > >> >> > preferred.
> >
> > >> >> > Note: One might wonder why I only mention these issues in the
> context
> > >> >> > of local apps rather than web apps. I think the expectations and
> user
> > >> >> > behavior tendencies are fairly different in the desktop and
> mobile app
> > >> >> > space, and there are a number of ways malware is detected and
> > >> >> > contained in this area. The web app space is a lot more open and
> easy
> > >> >> > to exploit, and likely will be unless the whole paradigm changes.
> >
> > >> >> > --
> > >> >> > Ed Finkler
> > >> >> >http://funkatron.com
> > >> >> > AIM: funka7ron
> > >> >> > ICQ: 3922133
> > >> >> > Skype: funka7ron
> >
> > >> >> > On Feb 4, 10:03 pm, Cameron Kaiser<spec...@floodgap.com>  wrote:
> >
> > >> >> >> I'm still (softly) repeating the hope that this will be
> extended, even if
> > >> >> >> the Basic Auth API remains deprecated and static. An OAuth
> workflow is
> > >> >> >> constrained for desktop apps, and for apps that aren't or can't
> use a web
> > >> >> >> browser (in my case, text-mode twitter clients; other cases
> include all those
> > >> >> >> little curl scripts posting monitoring information, task status,
> etc.), OAuth
> > >> >> >> won't work at all.
> >
> > >> >> >> I fully support OAuth, but where appropriate. I think Ed Finkler
> said it
> > >> >> >> best when he said the breadth of Twitter applications currently
> extant
> > >> >> >> wouldn't exist were it not for a low barrier to entry. OAuth
> makes sense
> > >> >> >> in many places, but it doesn't make sense everywhere, and I hope
> alternate
> > >> >> >> methods of authentication remain possible even if they are
> intentionally
> > >> >> >> limited to steer preferred traffic to an OAuth workflow.
> Otherwise I suspect
> > >> >> >> the ecosystem "outside the browser" will be greatly reduced.
> >
> > >> >> >> --
> > >> >> >> ------------------------------------ personal:
> http://www.cameronkaiser.com/--
> > >> >> >>    Cameron Kaiser * Floodgap Systems *www.floodgap.com*
> ckai...@floodgap.com
> > >> >> >> -- Critics are the unpaid guardians of my soul. -- E. Stanley
> Jones -----------
> >
> > >> >> --
> > >> >> Alex Payne - API Lead, Twitter, Inc.http://twitter.com/al3x
> >
> > --http://stut.net/
>

Reply via email to