logoalt Hacker News

georgeburdellyesterday at 6:11 PM1 replyview on HN

Nope, just some internal facing code. The challenges boiled down to tracking what parts of the data got successfully sent to which recipients and how to get proof the data were transmitted correctly

I wish I would have found a 3rd party tool to do all this, but I never did


Replies

adammarplesyesterday at 11:54 PM

Is this not basically just torrenting?

show 1 reply