Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Anonymous Project Hosting

Name: Anonymous 2014-06-02 0:58

Ever wanted to write a program and release it, but was afraid that you might be oppressed because of it? Perhaps it was in direct defiance of software patent law. Perhaps it was a loli sex simulator. Perhaps it was software that automates your drug lab. In the end, you could not release it because you are ultimately a coward and there was nothing that would sooth your fears.

Well, nothing can be done about your cowardice, but might some system be designed to allow for anonymous, open source project hosting, one that would allow all types of miscreants and criminals EXPERT PROGRAMMERS and freedom fighters to share code and collaborate. Some projects that might find such an anonymous host useful are: cryptography projects, DRM circumventing software, loli sex simulators, drug lab automation programs, teledildonics gateways, dondle forking hardware projects, shiichan clones, fibs implementations in Scheme, Ahmed's gas chamber firmware, trademarked 3D printable models of cute figs that cost too much, and so much more!

Please use this thread to discuss how such a project might work and post your expectations, requirements, recommendations, general nay-saying, etc...

By it's anonymous nature, this service would alleviate many problems that exist within the surveillance-net. For instance, it would be prohibitively difficult to non-programming web designer hipsters and raging, ragging feminists to flood the place with constant derailing attempts in the name of social justice. This is because they could not associate the attention they get with their real names. Sure, they could post their public key on their Facebook and then sign their messages, but I doubt they could figure it out. On the other hand, Leah would be excluded too.

Name: Anonymous 2014-06-02 9:51

How would you prevent it from being filled up with child porn and malware?

Name: Anonymous 2014-06-02 11:04

>>4
The best you can do is prevent your own storage node (assuming it's distributed) from getting filled with CP and malware. Any other backdoor introduced to combat CP can also be used by governments to combat the people they don't like.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List