canvasxyz / okra
A pseudo-random deterministic merkle tree built on LMDB
☆70Updated 10 months ago
Alternatives and similar repositories for okra:
Users that are interested in okra are comparing it to the libraries listed below
- Hash consistent search trees.☆92Updated last year
- ⚡️ Peer-to-peer foundations for distributed applications☆117Updated this week
- ☆31Updated last month
- Go implementation of Rateless IBLTs.☆47Updated 7 months ago
- 🏰 the first JSON-like Byzantine Fault Tolerant CRDT☆214Updated 10 months ago
- ☆115Updated last year
- Efficient state-based CRDT replication and anti-entropy☆59Updated 3 months ago
- AWAKE Protocol Specification☆35Updated last year
- UCAN community site☆39Updated last month
- Rust implementation of UCAN☆64Updated 7 months ago
- 🔥 Cloudless realtime database☆81Updated last year
- ☆45Updated 11 months ago
- Working area for Braid extensions to HTTP☆239Updated 3 months ago
- General planning and documentation repository for the OCapN protocol suite for distributed networked objects☆178Updated this week
- UCAN Invocation & Pipelining☆14Updated 7 months ago
- Synthesize CRDTs from classic data types with verified lifting!☆145Updated 10 months ago
- A capability system for Willow.☆30Updated 8 months ago
- 🪣 DAG based key value store.☆44Updated 10 months ago
- User Controlled Authorization Network (UCAN) Specification☆227Updated last week
- High Level IPVM Spec☆52Updated 2 years ago
- SQLite based ipfs block store☆48Updated last year
- ☆11Updated last year
- The cryptographic signature multifomat☆11Updated 8 months ago
- a build tool -- based on "hashes go in, hashes come out" and hermetic, containerized environments for every step.☆45Updated last year
- Real world text editing traces for benchmarking CRDT and Rope data structures☆46Updated last year
- Lisp implementation of Lurk.☆71Updated 6 months ago
- Local-first address book☆69Updated 3 years ago
- 🐧 UCAN RPC☆53Updated 2 weeks ago
- User-Controlled Authorization Network (UCAN) tokens in go☆31Updated this week
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago