Get the latest tech news
Willow Sideloading Protocol
A protocol for peer-to-peer data stores. The best parts? Fine-grained permissions, a keen approach to privacy, destructive edits, and a dainty bandwidth and memory footprint.
Instead of statefully coordinating which data to exchange, the Sideloading Protocol uses drops, arbitrary sets of Entries and Payloads compiled into a single bytestring. USB keys SD cards CDs Email attachments Instant messages Torrents Or whatever means users have at hand. Once created, drop can be transported by whatever means a single bytestring can be transferred, to be decrypted and the recovered contents ingested by its intended recipient.
Or read this on Hacker News