Anonymous ID: d1575b QAnon Computer Programming July 30, 2018, 3:24 a.m. No.2352371   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

This is a thread created by a programmer for programmers to interact in support of QResearch. Great place to perform live Q&A chat.

 

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf

Max filesize is 16 MB.

Max image dimensions are 15000 x 15000.

You may upload 5 per post.

Anonymous ID: d1575b July 30, 2018, 3:30 a.m. No.2352403   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

WT, here. TW said:

 

>It's a searchable offline archive of posts and tweets, easy to seed with multiple collections. Shows time deltas. Qclock filter function. Caching proxy for images, rewrites URLs to fetch from archives when original picture is not available.

 

>I run it locally. I have no idea what the best packaging/distribution approach is, thoughts are welcome.

 

>Multiple levels of trust needed to share, run. Doing this safely for everybody is my main concern. Not everybody can inspect the code at every release, or would be willing to install/run on their machine.

 

Wow. Sounds involved. Let's get some basic info outta the way and maybe I can give you things to considerโ€ฆ

Anonymous ID: d1575b July 30, 2018, 3:39 a.m. No.2352462   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2495

Third, what's the dev platform?

 

I know alot about deployment on Windows (all flavors), Android and a little about Apple (if developing on Windows). Other stuff you'll have to leave a post here and wait to hear something.

Anonymous ID: d1575b July 30, 2018, 3:49 a.m. No.2352520   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2550 >>4303

>>2352495

So you have a very unique problem, my man. I don't think I've ever been involved in a deployment that was anonymous. It may sound ridiculous but perhaps you need to think like a hacker in that you deploy an install program via torrent and include a pre-auth "safe certificate" from an anti-virus company.

Anonymous ID: d1575b July 30, 2018, 4:12 a.m. No.2352681   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2352645

I'm saying get a reputable company to certify your app as legit (not malware) since you'd be anonymously distributing it as a torrent.

 

Then, using MD5 can tell the end user that not a single byte has been altered in the current deployment. MD% is more than adequate for that small task.