shotgun_surgery

joined 1 year ago
[–] [email protected] 1 points 3 months ago

Oh I don't defend neither. I'm an anarchist.

[–] [email protected] 1 points 4 months ago (2 children)

Lol what would be "mine"? I don't even vote.

[–] [email protected] 0 points 4 months ago (4 children)

Are you unironically boasting that the megalomaniac you choose as your master is better than the megalomaniac someone else chose as theirs?

[–] [email protected] 0 points 4 months ago (6 children)

Lol I'm looking at your replies and they look quite scriptable

[–] [email protected] 1 points 4 months ago

True, but they'd have to compete against alternatives that are repairable, because the IP no longer impedes that competition.

[–] [email protected] 2 points 4 months ago
[–] [email protected] 4 points 4 months ago (3 children)

Interesting timing.

[–] [email protected] 4 points 4 months ago

It's ass based communism lol

[–] [email protected] 2 points 4 months ago

Bumhole heatstroke is a thing. Gotta be careful.

[–] [email protected] 6 points 4 months ago (1 children)

Man, this post is pure gold.

 

I've seen a few but I can't decide which protocol to use yet. I'm working on a DHT pet project and I'd like to avoid making it rely on any relay servers.

Thanks in advance for any pointers!

1
DHT Pet Project (links.hackliberty.org)
 

I'm building this implementation of a circular DHT from scratch because I want to learn and understand how peer-to-peer protocols work. So far so good, but I'm realizing I don't know two things and I don't know where to find them:

  1. What NAT traversal method to use. Do I necessarily need to rely on relay servers for UDP hole punching or STUN?
  2. What is the most reasonable way to test the overall system is working? Should I build a docker network with each node being a container or are there specialized tools for testing networked applications?

Thanks in advance for any answers or pointers!

 

I'm following this course with its book and it's really nice.

view more: next ›