Are you unironically boasting that the megalomaniac you choose as your master is better than the megalomaniac someone else chose as theirs?

Lol I'm looking at your replies and they look quite scriptable

True, but they'd have to compete against alternatives that are repairable, because the IP no longer impedes that competition.

Interesting timing.

It's ass based communism lol

Bumhole heatstroke is a thing. Gotta be careful.

Man, this post is pure gold.

I don't think there's any source I can trust other than fdroid

I wonder if instead of pushing for right to repair, wouldn't it be better to push for the abolition of intellectual property altogether.

7

I've seen a few but I can't decide which protocol to use yet. I'm working on a DHT pet project and I'd like to avoid making it rely on any relay servers.

Thanks in advance for any pointers!

18
DHT Pet Project (links.hackliberty.org)

I'm building this implementation of a circular DHT from scratch because I want to learn and understand how peer-to-peer protocols work. So far so good, but I'm realizing I don't know two things and I don't know where to find them:

  1. What NAT traversal method to use. Do I necessarily need to rely on relay servers for UDP hole punching or STUN?
  2. What is the most reasonable way to test the overall system is working? Should I build a docker network with each node being a container or are there specialized tools for testing networked applications?

Thanks in advance for any answers or pointers!

1

I'm following this course with its book and it's really nice.

view more: next ›

shotgun_surgery

joined 1 year ago