mrgroovski

Members
  • Posts

    2
  • Joined

  • Last visited

mrgroovski's Achievements

New User

New User (1/3)

  1. A little more snooping and I answer my own question. A tacit endorsement of such usage from the CEO? http://blog.vrypan.net/2013/04/24/bittorrent-sync/ Seems people are using it for things like this: https://open-source.rackster.ch/project/ispconfig3-userdir-plugin/note/BTSync-Key This isnt huge, its massive. Something like it could be the infrastructure for a whole new and better web.
  2. Hi - fantastic product, but I am very new to it. Read-only sync is brilliant and very useful I think, but I see no discussion of the following topic in my searches. It occurred to me that publishing a secret key (say on a website) to a read-only folder would be a way to distribute content. A google search shows a few users publishing keys (one publishes source code to something). Is this a good idea? How secure is this? An original author presumably controls the folder, and I assume BTSync does not propagate changes to a read-only folder (but does allow changes). Assuming someone could create rogue sync agents, could they insert/edit content and get it to propagate through the network, basically overruling the original author or is there security for this built-in? Are changes "signed" by the author? Publishing a secret key for public use would be a great way to: Update software/OS Share obscure data publicly (such as any sensor or time series data) Create serverless, high-bandwidth websites that update periodically. ....if it is secure and can't be tampered with by anyone but the original author. Any thoughts?