Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Dan Moore

👤 Person
204 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, you could build in some kind of like slop factor, right? Like let it happen two times or three times. But it is, you know, the entry point into your application. And there's definitely some worries around that, right? Right. We definitely, ours is still one-time use for sure.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, you could build in some kind of like slop factor, right? Like let it happen two times or three times. But it is, you know, the entry point into your application. And there's definitely some worries around that, right? Right. We definitely, ours is still one-time use for sure.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But I mean, I think there's an interesting point in kind of what you were saying, Jared, is like you as the authentication system is kind of unique among users. like sometimes I think of an authentication system like a database or a queue or something else like that, where it's kind of part of an application and it's foundational, but it's undifferentiated.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But I mean, I think there's an interesting point in kind of what you were saying, Jared, is like you as the authentication system is kind of unique among users. like sometimes I think of an authentication system like a database or a queue or something else like that, where it's kind of part of an application and it's foundational, but it's undifferentiated.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And then at the same time, it is so user facing, right? So unlike your data, like you can swap out a database behind change log if you wanted to. It sounds like it wouldn't be very much fun, but you could do it. without ever affecting the user experience, whereas changing out your authentication system would definitely impact users.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And then at the same time, it is so user facing, right? So unlike your data, like you can swap out a database behind change log if you wanted to. It sounds like it wouldn't be very much fun, but you could do it. without ever affecting the user experience, whereas changing out your authentication system would definitely impact users.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And because it's in the user flow, you really need to meet users where they are, right? Like you said, the first four or five times, you're like, hey, can you please use different software? And after a while, you're like, well, I really want you to log into my system. Therefore, I need to be the one to change, right? Like you need to adjust to where the users are coming from.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And because it's in the user flow, you really need to meet users where they are, right? Like you said, the first four or five times, you're like, hey, can you please use different software? And after a while, you're like, well, I really want you to log into my system. Therefore, I need to be the one to change, right? Like you need to adjust to where the users are coming from.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So Adam, sorry, like I haven't used Tailscale myself personally. I've read about it, but like, is it when it, when you're logging with GitHub, it's prompting you for a bunch of different permissions. It's not just saying, Hey, I just want his email address.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So Adam, sorry, like I haven't used Tailscale myself personally. I've read about it, but like, is it when it, when you're logging with GitHub, it's prompting you for a bunch of different permissions. It's not just saying, Hey, I just want his email address.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So honestly, I wouldn't blame GitHub for that. That's actually on tail scale because tail scale asks for permissions.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So honestly, I wouldn't blame GitHub for that. That's actually on tail scale because tail scale asks for permissions.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah. Yeah. Tail scale. Come on, man. Come on. You don't need all that.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah. Yeah. Tail scale. Come on, man. Come on. You don't need all that.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So my feedback on that is... That is a GitHub thing, though.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So my feedback on that is... That is a GitHub thing, though.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, and so my guess is that there's, it's probably, you're right. It's probably a combination. Like I haven't delved deeply.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, and so my guess is that there's, it's probably, you're right. It's probably a combination. Like I haven't delved deeply.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's like, yeah. How core screen does GitHub allow permissions to be asked for? And then what permissions is Tailscale asking for? And my guess is this happened, like, this is probably a little bit like the magic link experience that Jared was talking about, where started out and Tailscale asked for like very small amounts of data.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's like, yeah. How core screen does GitHub allow permissions to be asked for? And then what permissions is Tailscale asking for? And my guess is this happened, like, this is probably a little bit like the magic link experience that Jared was talking about, where started out and Tailscale asked for like very small amounts of data.