See in-line...

On Jul 11, 2006, at 1:30 PM, Jeremy Epstein wrote:

I worry about how to explain the difference between 1 and 2 to users in laymen terms. Secure sharing? Insecure sharing? Requires accounts sharing? Doesn't require accounts sharing?

you dont have to. The permissions you assign have everything to do with how you stamp events:
"invitations" only allow "reply actions" for the invitees
"meetings" may allow "accept" "reject" "tentative" and "schedule"
if you are not on the list for an event you can only look at it. Maybe not even that.
etc...
that and the rule "you can never touch someone else's event" unless you are made an "owner" of the calendar.

I think we've always imagined a more open collaboration model than this. A lot of the usage scenarios / workflows we've sketched out and storyboarded involve multiple people collaborating on a single item. (See: http://wiki.osafoundation.org/bin/view/Journal/ StampingStoryboards#StampingWorkflow)

i know that as soon as somebody suggests entering usernames, there's a
storm of objection that there should be a directory or addressbook
that we can select usernames from. nah. i mean that would be cool, and
maybe we could do it later on, but for now, let us just enter
usernames. that's what the csg folks said a year ago, and it's still
good enough for "calendaring without IT".


or you scrape. IE "send to your friends"-- enter in you gmail username and password. WE scarpe the address book and present emails to you to send invites to. (this is more common then you think)


+ Should we consider per user tickets? How difficult is this. Are there

what does this mean?

Each sharee gets a unique ticket that can be turned off if it is compromised.

that is still the equivalent of making each user on windows an admin.

I'm not sure I understand.



they certainly could, but spamming isn't the main threat. exposing the
ticket to the general public is.

+1 to that

This was more of question for spamming. I'm not sure why an individual would want to graffiti someone else's calendar manually.

Not necessarily graffiti. Imagine someone taking mitch's ticket and making a website ("pitch your idea to mitch" ), then submitting it to slashdot.

This is where the ability to shut off an individual ticket would help.

Even so, I'm not sure how many people Mitch would give read-write access to on his personal calendar. Which means that even if we didn't have per-sharee read-write tickets, if the share was compromised, it wouldn't be that much of a hassle to issue a new read- write ticket and have 2 sharees re-subscribe with the new ticket.

The scale of sharing we're talking about in the Beta timeframe is just very small.

It's one of those things where if you're a high stakes person, you make sure to be extra careful about these things. And if you're not a high stakes person, then why would anyone bother manually spamming you in the first place? It seems like in most scenarios, it wouldn't be worth anyone's time to spam shared collections unless it could be done in an automated way.

I'm not trying to discount the scenarios that are being brought up. They are legitimate and serious. I'm just wondering if we can get away with what we have in the beta timeframe because of the nature of the collaboration scenarios we're supporting.

===

On a related note, I'm starting to get confused with all the different 'spammy' things that could happen. I think there are 2-3 very distinct scenarios and teasing them a part might help us figure out which scenarios are more or less likely in the Beta timeframe.

How unwanted data gets added to a shared collection where the read- write ticket has been compromised:

1. SPAM: Malicious or Commercial, Automated, Large-scale
2. Graffiti: Malicious, Manual, Small-scale

+ Do they need to know what protocol Scooby speaks and tailor the data they
add to that protocol?

no, because the url will take them to the scooby calendar/event interface.

Sorry, this question was about automated spamming too.

the same rules apply-- its actually likely that the spammer may attempt to penetrate the cosmo server as it uses a more well established protocol(calDAV).
It seems like SPAM is undesirable for both public and private information. My question was more about how serious a problem spamming would be in the near-term. It seems like you don't feel like it will be a major problem?

Ask that the next time OSAF gets slashdotted.



I'm drawing this from a current project involving some very consumer stuff(podcasting) where there is an effort to sign up members fast, yet still limit spam. The catch is in reducing the requirements for sign up to the bare minimum. Right now cosmo requires or appears to require six fields. it should only require one-- email. Cosmo can mail a generated password to the user email.

Jeremy



_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Open Source Applications Foundation "Design" mailing list
http://lists.osafoundation.org/mailman/listinfo/design

Reply via email to