original, saw this somewhere else too. ddos stuff. this one blames ru for archive.today mess. sounds about right. didn’ intend it to look like an announcement here. it kind of did. post based on ars story, apparently. who knows

  • Em Adespoton@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    17 hours ago

    The idea is to verify the archival copy’s URL, not to verify the original content. So yes, a server could push different content to the archiver than to people, or vary by region, or an AitM could modify the content as it goes out to the archiver. But adding the sha256 in the URL query parameter means that if someone publishes a link to an archive copy online, anyone else using the link can know they’re looking at the same content the other person was referencing.

    If the archive content changes, that URL will be invalid; if someone uses a fake hash, the URL will be invalid (which is why MD5 wouldn’t be appropriate).

    The beauty of this technique is that query parameters are generally ignored if unsupported by the web server, so any archival service could start using this technique today, and all it would require is a browser extension to validate the parameter.

    Link it to something like Web of Trust, and you’ve solved the separate issue you described.

    In fact, this is a feature WoT could add to their extension today, and it would “Just Work”. For that matter, Archive.org could add it to their extension today, too.

    Remind me to ping Jason about that.