@jonny @ansuz @jonah I've thought of adding that to @agregore but haven't been prioritizing it because it means you're leaking your browsing history to the network. A bad actor could see all the pages you're seeding with enough effort. 😥 Sharing between friends could make it less risky but even then there's a bunch of risk / hassle. I'm down to build it if someone wants to help crowdfund :P
@jonny @ansuz @jonah Alternately one could use something with IP privacy and zero accounts / names to reduce ability to identify. Requiring the reader to ask a specific URL hash could be good to reduce ability to get *all* hashes. Also have some sort of detection for history brute forcing and block the peer. Lots of options tbh. Not easy and lots of gotchas however
@mauve
@ansuz @jonah @agregore
Yes of course, I would want something like a probabilistic service model that mixes all the pages I visit with all the pages my neighbors in k-space visit or something like that. That is not like "threat modeled" or anything just vibes, but ya straight up serving my browser history is no good but there has gotta be a way