4 points | by satyakommula 10 hours ago ago
1 comments
One design choice worth clarifying: I intentionally avoided any backend. Multi-device usage is handled via encrypted, deterministic backups instead of sync, which keeps the threat model small and predictable.
One design choice worth clarifying: I intentionally avoided any backend. Multi-device usage is handled via encrypted, deterministic backups instead of sync, which keeps the threat model small and predictable.