Skip to content
#

P2P

Peer-to-Peer (P2P) applications share resources and communicate in a decentralized or distributed architecture. Often application nodes communicate directly with each other or cooperate to do work which benefits other nodes or the overall P2P system. In a pure P2P system, there is no distinction between client and server.

Here are 1,716 public repositories matching this topic...

practicalswift
practicalswift commented Aug 12, 2020

Enable unused member function diagnostic by default.

Clang has a nice compiler diagnostic -Wunused-member-function which is good at catching accidentally dead/unreachable code.

While dead/unreachable code is most often harmless from a security/robustness perspective there are instances where dead/unreachable code may be an indication of more serious issues. Enabling this diagnostic allows

MariusVanDerWijden
MariusVanDerWijden commented Apr 17, 2020

We are currently thinking about fixing some bugs in the mobile backend.
This issue shall act as an umbrella issue to collect some of the quirks of the backend that could be improved in the future. If you have any suggestions, feel free to add.

  • All functions are undocumented
    Maybe we can find a way to insert Javadoc into the generated.aar

  • Address.toString() returns {}Address
    In order

patchwork
cinnamon-bun
cinnamon-bun commented Jun 7, 2019

There is a user with a dick pic as their icon. Many people have blocked them, as have I.

I recently clicked through to their profile page to remember if I had blocked them and although their posts are hidden, their user icon is still shown.

Can we use CSS to blur the user icons of blocked and ignored users?

filter: blur(8px);
-webkit-filter: blur(8px);

(Those icons might al

ELLIOTTCABLE
ELLIOTTCABLE commented Feb 29, 2020

On macOS, it's a fairly standard practice to display a pre-roll if your application needs some form of permissions, before calling the system APIs for the first time that will actually produce the system's requested-permissions window.

For instance, for any given end-user, the following window is likely A) intimidating, and B) possibly encourages insecure habits, such as simply clicking "acce

You can’t perform that action at this time.