Monday, November 3, 2025

YuKKi-OS + JoBby_$l0tty v3.2 RLS + Adi http wrapper CEF

Forget bloatware like; Kubernetes. Try YuKKi OS 3.2 CRTC compliant with Jobby Slotty dependency aware RBE! - Updated with chat and pretty prompts but still crisp and sexy in Internet 3.0


Impressed by this? Try GOPS as well in your favorite KML compositor! Now Adi Protocol works with the p2p functions in YuKKi and JobbySlotty allows for 'rjob' or remote binary execution with dependency aware scheduling over Adi Protocol.


 ⚒️πŸͺ²πŸ’΄YuKKi-O$.£Γ°Ι™.v1a - p2p OS web 4.0 Lead Development Edition 

Jobby Slotty v1a πŸ‘›πŸ’‹πŸ’„πŸ’ŠπŸ”₯πŸ—πŸ»πŸ› RBE - devstation - Lead Development Edition

YuKKi 3.1.sh - Deprecated

Adi Protocol - For your study Why?

Adi HTTP wrapper - CEF extensible To browse 🌬🌎

Step 1. LINUX - Your choice 64-bit

Step 2. RTFM



What's New in YuKKi OS 3.2: Power Meets Polish

​YuKKi OS 3.2 is the latest update to our secure, decentralized P2P platform. This version builds on the robust compliance and distributed-computing framework of 3.1 by re-introducing the visual flair of our original compositor suite, all while retaining the powerful linenoise terminal.

​Here are the key features you can build and run today:

​Key Features of YuKKi OS 3.2

​1. Configurable Visual Prompt (New in 3.2!)

​We've brought back the beloved "Zsh-style" prompt as a configurable option, giving you the best of both worlds:

​Configurable: The yukki_configurator.sh script now asks if you want to enable the "enhanced visual prompt."

​Informative: When enabled, your prompt displays the current time and your user profile, complete with colors:

[HH:MM:SS] [profile_name] ✔ > 

​Powerful: This new prompt is rendered directly by the linenoise library, so you retain full command history and tab-completion.

​2. Advanced P2P Terminal

​The client is built on linenoise, providing a modern shell experience:

​Command History: Cycle through previous commands with the arrow keys.

​Context-Aware Tab Completion: Press tab to auto-complete commands. It's even smart enough to auto-complete peer UUIDs for commands like msg, send, or block.

​3. Distributed Build System ("JobbySlotty")

​Turn your P2P network into a simple, effective distributed CI/CD system.

​Local, Dependency-Aware Job Queue: Submit local tasks (like make or ./run.sh) using the job submit command. The system manages a queue, executes jobs, and even supports dependencies (e.g., deps:1,2).

​Remote Job Submission: Securely send a build job to any peer on the network using rjob submit <uuid> .... The peer will run the job in their own local queue.

​Status Tracking: Check the status of local (job status) and remote (rjob status) jobs at any time.

​4. Secure & Private P2P Communication

​All communication is end-to-end encrypted over mTLS using our custom ADI (Advanced Data Interchange) binary protocol.

​Private & Broadcast Messaging: Send a private message to a single user with msg <uuid> ... or broadcast to all peers with say ....

​Secure File Transfers:

​send <uuid> <filepath>: Push a file to a peer.

​get <uuid> <filename>: Request a specific file from a peer.

​ls <uuid>: List the files in a peer's shared directory.

​5. Robust Compliance & Security Framework

​Security and user control are at the core of the platform, with a design inspired by CRTC and PIPEDA principles.

​Full PKI Infrastructure: The included yukki_configurator.sh script builds a root Certificate Authority (CA) and generates unique, signed certificates for the server and each client.

​Cryptographic Identity: Each client's unique UUID is embedded in their mTLS certificate's Common Name (CN), cryptographically verifying their identity on the network.

​Mandatory User Consent: The client will not connect to any network until the user explicitly reads and agrees to the terms of data sharing (logging consent locally for audits).

​User-Controlled Blocklist: Instantly block all incoming P2P connections from any peer using the block <uuid> command.

​6. Decentralized Peer-Discovery

​Unlike a traditional C2, the server has no direct control over clients. Its sole purpose is to act as a "bootstrap server" to authenticate peers and securely share the network list, allowing peers to find and connect to each other directly.

Special Networking Features of YuKKi OS 3.2

​Beyond the user-facing commands, YuKKi OS 3.2 runs on a sophisticated and secure networking model that combines the best of client-server and P2P architectures.

​1. Dual-Channel "Bootstrap" Architecture

​The system operates on two separate communication channels for maximum security and privacy:

​Bootstrap Channel (wss://): Your client's only communication with the central server is over a secure WebSocket (using mongoose). This channel is used exclusively for peer discovery. The server authenticates you via your mTLS certificate and adds you to a "phone book" of online peers. Critically, the server never sees or proxies your messages, files, or jobs.

​P2P Channel (Direct mTLS): When you want to interact with a peer (e.S., msg or send), your client gets their address from the "phone book" and opens a direct, end-to-end encrypted connection to them. This is where all the real work happens, far from the server's view.

​2. Custom ADI (Advanced Data Interchange) Protocol

​All P2P communication runs on a custom, high-performance binary protocol. Instead of a slow, text-based format like JSON, ADI uses a lightweight 5-byte header (4-byte length, 1-byte type) to define packets. This allows the system to efficiently differentiate between a text message (P2P_MSG_CMD), a file chunk (P2P_FILE_CHUNK), or a remote job request (P2P_JOB_SUBMIT_REQ), ensuring minimal overhead and high throughput for file transfers.

​3. Cryptographic Identity Verification

​YuKKi's security goes beyond standard TLS encryption. It uses Mutual TLS (mTLS), meaning both the client and the server (or peer) must present and validate each other's certificates. The system's "killer feature" is that each client's unique UUID is embedded in its certificate's Common Name (CN).

​When you connect to a peer, your client doesn't just trust their IP; it cryptographically verifies that the certificate they present contains the exact UUID you were expecting. This makes identity-spoofing nearly impossible and is the backbone of the block <uuid> command.

​4. Persistent Connection Pooling & Concurrency

​The client is highly responsive, as it manages a pool of active P2P connections. If you send 10 messages to the same peer, it intelligently re-uses the same secure mTLS connection instead of performing 10 costly new handshakes. Furthermore, every incoming and outgoing P2P connection is handled in its own dedicated thread, allowing you to run multiple file transfers, receive messages, and queue jobs simultaneously without slowdowns.




No comments: