Linux Walt (@lnxw37j1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw37j1@gnusocial.jp)'s status on Tuesday, 27-Aug-2024 10:01:12 JST
-
Embed this notice
Linux Walt (@lnxw37j1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw37j1@gnusocial.jp)'s status on Tuesday, 27-Aug-2024 10:01:12 JST Linux Walt (@lnxw37j1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} https://www.youtube.com/watch?v=yBtyNIqZios [www youtube com] #Freenet seems to be something way different than what it seemed like a few years ago. My guess is they revised and rewrote it.
Now, I never used it. (Something about untrusted people storing encrypted data--potentially illegal content--on your hard drive and never knowing for sure that some three-letter agency hasn't found a way to decrypt it and place the blame on you.)
And at the same time, it is still similar to what it appeared to be. keys are hashes of the encrypted stored data. There's going to be some sort of overlay that maps keyspace onto IP (v4? v6?) addresses. So at some level, it superficially resembles #IPFS, modulo the use of web-based protocols by client programs.
I should probably see whether I can find an unused "Zero" device ( Raspberry Pi #RasPi Zero, Orange Pi Zero, Banana Pi Zero, or similar ) with an external storage drive and spin up a node to explore Freenet.
Hopefully, I won't stumble onto bomb-making plans or snuff porn.
Now back to the video and then back to my training programs.