Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- **π΄[GNU](https://en.wikipedia.org/wiki/GNU)** **π΄[Bash](https://en.wikipedia.org/wiki/Bash_(Unix_shell))** **π΄[Hello World!](https://en.wikipedia.org/wiki/Linus_Torvalds)** **π£[HTML](https://en.wikipedia.org/wiki/HTML)** **π£[Javascript](https://en.wikipedia.org/wiki/JavaScript)** **π£[PHP](https://en.wikipedia.org/wiki/PHP)** **π£[Friends](https://en.wikipedia.org/wiki/Scripting_language)** **π΅[cURL](https://en.wikipedia.org/wiki/CURL)** **π΅[Docker](https://en.wikipedia.org/wiki/Docker_(software))** **π΅[Podman](https://podman.io/docs)** **π’[AI's](https://en.wikipedia.org/wiki/Artificial_intelligence)**<br>
- ___
- ## **Supporting Diaspora**
- **Dynu Static IP**: http://perevictor.accesscam.org:8000/drakkarIPFSpoint.txt: _currently disabled during development and testing_
- In that Dynu URL anyone could access the file called **drakkarIPFSpoint.txt**, which contains the **List of Diaspora CIDs** that I want to preserve and spread on the Internet. The first line of that file has the server http link, for example, **perevictor.accesscam.org:8000**, followed by other known servers. It's doable, right? . In addition, the **Drakkar IPFS point** docker app has scripts to **add via its IPFS** the downloaded and compressed Diaspora posts (tar.gz), that is, those Diaspora posts that I (a user) want to **preserve and spread on the IPFS Internet network** . It's also doable, right?
- Other users using their own docker **Drakkar IPFS point** can do the same. A script periodically checks the http URLs of peers, for example, **perevictor.accesscam.org:8000/drakkarIPFSpoint.txt**, for changes to download. Additionally, that txt file may contain a **list of CIDs**, with the most recent at the end while the first line contains the server name followed by others already known. Thus, each user **progressively increases the list of servers** interested in this process. They can then access the public CID corresponding to the compressed tar file perevictor.accesscam.org:8000/drakkarIPFSpoint.txt, **as well as those of other users**. It can be done, right?
- There is a bottleneck, each user docker **Drakkar IPFS Point** has to check each CID listed in each remote **drakkarIPFSpoint.txt** to find at first glance **malicious material**. At the moment there is a necessary approach, although it compromises updating the Diaspora source code: **[View the Diaspora needed compromise](https://diaspora.psyco.fr/tags/trondiasporapsycofr_36644929)**
- π[Main Folder](https://diaspora.psyco.fr/tags/trondiasporapsycofr_35145236_35147309a1) π[Group Folder](https://diaspora.psyco.fr/tags/trondiasporapsycofr_35145236_35147309a12) β [Forever Tag](https://diaspora.psyco.fr/tags/trondiasporapsycofr_36644897)
- []( #notas) []( #docker) []( #debian) []( #linux) []( #coding) []( #trondiasporapsycofr_35145236_35147309a12) []( #trondiasporapsycofr_36644897)
Advertisement
Add Comment
Please, Sign In to add comment