Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Very nice! I'm assuming this is based on the wonderful "Magic Wormhole"? Is it actually using that program under the hood?


No, its doesn't use any of the same protocols that Magic Wormhole uses.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: