On Jun 23, 2009, at 11:28 AM, Zooko Wilcox-O'Hearn wrote:

I haven't yet read David Roundy's next followup on the ticket where he suggests another approach.

Oh, good! David's approach sounds even better because (as I dimly understand it), it includes the filesystem state itself as well as the patches in the inputs to the hashes. This should make it roughly equivalent to git in security. (Actually better if it is using sha-256 instead of sha-1.)

Regards,

Zooko
_______________________________________________
darcs-users mailing list
[email protected]
http://lists.osuosl.org/mailman/listinfo/darcs-users

Reply via email to