Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm working on this exact same thing. Was your code ever published or did you blog about it?


Nope, just some internal facing code. The challenges boiled down to tracking what parts of the data got successfully sent to which recipients and how to get proof the data were transmitted correctly

I wish I would have found a 3rd party tool to do all this, but I never did


Is this not basically just torrenting?


I guess, but some of the recipients are just 3rd party automated systems with a standard set of instructions, so I have no control over the protocol used




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: