Anonymous VCS

BM-2cUVNU5jnDgTqkZ84cKSX9JqL5CegrfVDK
Jan 18 17:42

Would anyone use a decentralized, anonymous VCS for small codebases? I've been thinking about this idea, of a VCS that allows a developer to publish code anonymously, allows users to clone repos anonymously, and prevents any snooper from discovering the locations of the users. It sounds good in theory but would anyone actually use such a system?

[chan] Crypto-Anarchist Federation
Feb 6 10:42

Would anyone use a decentralized, anonymous VCS for small codebases? I've been thinking about this idea, of a VCS that allows a developer to publish code anonymously, allows users to clone repos anonymously, and prevents any snooper from discovering the locations of the users. It sounds good in theory but would anyone actually use such a system?

[chan] Crypto-Anarchist Federation
Feb 6 11:40

I heard about stylometry for source code. It works exaclty same as stylometry for text. It is hard to create code and stay anonymous. Search more about in defcon or ccc wideos.

[chan] Crypto-Anarchist Federation
Feb 6 11:51

what if you run the code through an obfuscator before publication?

[chan] Crypto-Anarchist Federation
Feb 6 12:56

Comparing stylometrically source code from Snowden / Wikileaks leaks with Github repos one can trace NSA operatives publishing on Github.

[chan] Crypto-Anarchist Federation
Feb 6 15:13

is there anything published about these traced operatives?

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
Integrated Circuits (ASICs) and FPGA "lab attack" Trojan Detection using IC fingerprinting. Feb 25 11:13 1
Tor / Proxychains is leaking my hostname Feb 23 08:31 3
@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange Feb 22 14:04 2
Compress Random Data Feb 19 06:34 5
Your Mama 1$ §çÛM Feb 18 20:58 1
A satellite engineer explains the truth about satellite operations Feb 18 18:16 3
Satellites Are Fake - Just Another NASA Hoax Feb 18 17:27 1
Globewashing Feb 18 07:37 1
how to make bitmessage secure Feb 18 04:59 1
Are you blacklisted? Feb 18 01:49 1
Mitigating exploited software with firejail Feb 18 01:45 1
MeinCoin Crypto Research - Screenshot Feb 17 13:16 1
Constant Conflict - First published From Parameters, Summer 1997, pp. 4-14: US Army War College] Feb 17 08:28 3
FPGA Hardware backdoors news. Feb 17 08:21 1
Consider this problem. Feb 17 07:10 1
How many users have bitmessage in the world? Feb 16 20:25 2
test 44 Feb 16 19:14 5
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 03:08 1
Bitmessage components security seclusion example Feb 16 01:05 1
NOTICE: Address Revocation Feb 15 02:49 1
Truly, truly, Bitcoin is a failure Feb 13 12:22 1
Proof of Work is the worst way to do a BlockChain Feb 13 12:10 1
privacy software / services list Feb 11 19:18 5
THE WORLD'S MOST SECURE MESSAGING SYSTEM Feb 10 11:07 1
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Feb 10 08:06 2
hacker for hire Feb 10 02:26 1
a Feb 9 21:21 1
z Feb 9 21:21 1
test1 Feb 9 20:25 3
ZRe: test5 Feb 9 12:51 1
aRe: test5 Feb 9 12:51 1
my pleasure Feb 8 17:06 1
Anonymous VCS Feb 6 15:13 5
The best descriptions of trolls and idiots Feb 6 12:57 2
crypto question Feb 6 12:39 1
since leaving general chan Feb 6 12:16 3
Help Fight Government Tyranny Feb 6 02:04 1
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:53 1
Crypto-Anarchist Literature Feb 4 11:19 1
Help needed with identying crypto paper Feb 1 12:25 1
OMEGA user survey Feb 1 03:34 2
What is secure? Jan 29 05:15 14
An Inside Job: Remote Power Analysis Attacks on FPGAs Jan 29 00:02 1