Anything that uses encryption to keep content away from spying eyes. End-to-end encryption is the best, because there need be no trusted intermediary. Some software projects are always fully end-to-end encrypted. Examples include NNCP, Syncthing, Yggdrasil, and Gemini. For more on encryption, see: OpenPGP tools: GnuPG (GPG) Sequoia PGP Age (Encryption) signify (not encryption, but cryptographic authentication) Links to this note Encrypting Filespooler Jobs With Age Like the process described ...| www.complete.org
Asynchronous communication is communication between two endpoints that doesn’t have to happen in real time or near-real-time. Compared to synchronous communication, asynchronous communication lets you trade latency for reliability. Asynchronous communication is closely related to the concept of store-and-forward networking and delay/disruption-tolerant networking. In fact, most asynchronous implementations are also store-and-forward and delay-tolerant, so these terms are often used intercha...| www.complete.org
Email is one of the most common examples of Asynchronous Communication people are familiar with today. It is a store-and-forward approach which is tolerant of temporary disruptions to services and supports multiple hops. Email is also a distributed system, supporting many different servers and providers. However, market forces have caused Google and Microsoft to have an outsized influence on email, and their algorithms and policies make it increasingly difficult for independent mail servers t...| www.complete.org
I sometimes see people read about NNCP and wonder “This sounds great! But… what can I do with it?” This page aims to answer those questions. Either before or after reading this page, you might find these three pages useful: NNCP NNCP Concepts Getting Started with NNCP Asynchronous Communication A Quick Word on Background NNCP frees you from the tyranny of online. Compared to something like ssh, with NNCP, you trade latency for reliability and flexibility.| www.complete.org