Jan 18 17:42
Would anyone use a decentralized, anonymous VCS for small codebases? I've been thinking about this idea, of a VCS that allows a developer to publish code anonymously, allows users to clone repos anonymously, and prevents any snooper from discovering the locations of the users. It sounds good in theory but would anyone actually use such a system?
Jan 18 20:35
something on top of ipfs?
Jan 19 09:08
Granny Smith doesn't know how to use IPFS.
Jan 19 12:21
ipfs.exe init ipfs.exe daemon
Jan 19 12:40
OK, I understand how to do a basic setup. I usually run ipfs daemon --mount and that mounts folders at /ipfs and /ipns but I don't know how to do much more than that. The instructions on their website are a bit confusing for a computer beginner like Granny.
Jan 19 13:26
How to do dynamic php website in ipfs? Or what?
Jan 19 13:28
How to mine bitcoin in ipfs? How to cook ramen in ipfs? Or what?
Jan 19 15:50
> The instructions on their website are a bit confusing for a computer beginner like Granny. That's because they don't care about Granny. They only care about impressing other developers who can barely use their clunky and arcane software.
Jan 19 15:52
I know how to to upload an image file to the IPFS network, using ipfs add -r /path/to/file but how do I upload a music or video file, or a folder full of music files?
Jan 19 16:08
Would anyone use a decentralized, anonymous VCS for small codebases?
Jan 19 16:11
I meant something that uses IPFS as its storage/distribution backend. Doesn't mean the "end user" has to interact with IPFS directly.
Jan 21 16:06
these fucks usually cannot even type 2 lines with an intelligible description of what their crapware actually does, if anything
Jan 21 16:23
IPFS is supposed to be a backend, not a frontend.
Jan 22 01:20
Jan 22 09:43
Granny is real smart and reprogrammed torIRC to her liking
Jan 30 06:47
I won't use it...
Jan 30 09:17
I certainly would use it, as long as it does not involve things like Java or some other suspicious huge interpreter or bizarre language or whatever required.
Feb 6 10:40
Good for you. Would you like a medal for your bravery?
|d®úg pÛ§HëR$ ÃRë §çÛm||Feb 25 00:23||5|
|boost your credit score in 24 hours||Feb 24 23:35||5|
|Can't use Tor over Bitmessage||Feb 24 09:41||17|
|FLAT EARTH, why is there even a debate? ✞||Feb 24 09:17||1|
|JESUIT CONTROLLED PUTIN EXPOSED||Feb 24 09:15||1|
|Something About the Space X Launch Nobody's Talking About||Feb 24 09:09||1|
|Consider this problem.||Feb 24 09:06||2|
|http://33xtkivab2nthghe.onion/7uim34gdxs5z6b5l72nbji7ste||Feb 24 08:36||1|
|Mitigating exploited software with firejail||Feb 24 01:56||2|
|Tor / Proxychains is leaking my hostname||Feb 23 08:24||6|
|The Hidden Faith of The Founding Fathers||Feb 23 04:18||1|
|@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange||Feb 22 14:04||3|
|Your Mama 1$ §çÛM||Feb 18 21:00||1|
|dRúG pú§HëR§ Ã®ë $ÇúM||Feb 18 20:27||1|
|Ð®ÛG þÛ$hÊR$ ÃRë §Çúm||Feb 18 19:29||1|
|Globewashing||Feb 18 07:42||1|
|Critical vulnerability in v0.6.2||Feb 17 14:50||2|
|Download it.||Feb 17 07:58||2|
|$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist||Feb 16 02:20||1|
|lock down a computer with tor||Feb 13 10:38||3|
|privacy software / services list||Feb 11 12:32||6|
|About the political war against data security, good read||Feb 10 14:55||4|
|hacker service?||Feb 10 03:40||1|
|Using banknotes as ID tokens - sources for citation||Feb 9 15:12||2|
|bump||Feb 8 07:24||1|
|WARNING! denial of service message||Feb 8 01:55||2|
|Susimail on i2p||Feb 7 22:54||2|
|Not important human is back||Feb 7 12:08||4|
|Anonymous VCS||Feb 6 10:40||3|
|[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L||Feb 5 11:47||1|
|Did the NSA ‘create’ Satoshi Nakamoto?||Feb 3 07:55||1|
|second hand cpu?||Feb 2 12:00||1|
|Help needed with identying crypto paper||Feb 1 12:26||1|
|Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government||Jan 31 11:05||11|
|Public announcement||Jan 30 14:53||1|
|OMEGA user survey||Jan 30 12:57||4|
|Fwd: Re: OMEGA user survey||Jan 30 09:31||1|