Damus
Eleanor Saitta · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqkvmgdpe0vke6c76u0ag2ykr5f5a8cprsj99cymtmzasf25tnc8fq07ezqw nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8...
๐“ผ๐“ฎ๐“ป๐“ช๐“น๐“ช๐“ฝ๐“ฑใ€ใƒ„ใ€‘โ˜ฎ(๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ) profile picture
@nprofile1q... @nprofile1q... @nprofile1q... @nprofile1q...

๐Ÿคทโ€โ™€๏ธ it wont be easier to start something from scratch.
is there a threat model that describes what bittorrent is good for? is there a threat model that describes what git is good for?

is that a red flag to you?

one thing i can tell though - building something simpler from scratch is not gonna be easier. `dat` has more than a decade of hard work under its belt.

dat is mostly about secure high performance p2p applications by default.
3
Eleanor Saitta · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqkvmgdpe0vke6c76u0ag2ykr5f5a8cprsj99cymtmzasf25tnc8fq07ezqw nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8xsqj4cy9yj0d76epxrmasuu2aqy nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv...
Eleanor Saitta · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqkvmgdpe0vke6c76u0ag2ykr5f5a8cprsj99cymtmzasf25tnc8fq07ezqw nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8xsqj4cy9yj0d76epxrmasuu2aqy nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv...
Eleanor Saitta · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqkvmgdpe0vke6c76u0ag2ykr5f5a8cprsj99cymtmzasf25tnc8fq07ezqw nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8xsqj4cy9yj0d76epxrmasuu2aqy nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv...