Radicle: The Sovereign Forge

Architecture & Core Concepts

  • Radicle is a peer-to-peer, local‑first code collaboration stack built on Git.
  • Every user runs a node; there is no server/client distinction—“seed” nodes are just nodes with permissive seeding policies.
  • Nodes only store/seed what their policies allow; by default you only seed what you explicitly choose, not arbitrary network content.
  • Issues, discussions, and reviews are modeled as “collaborative objects” stored as signed Git objects that replicate with the repo.

Collaboration Model & UX

  • “Pull requests” are represented as “patches”: a namespace-based mechanism where your cloned fork becomes your personal Git namespace.
  • Some find the term “patches” confusing vs Git’s single-commit patches, and suggest “patchsets”.
  • Collaborative objects are implemented as CRDTs, so non-code artifacts converge automatically; source code conflicts are still resolved manually like normal Git.
  • There’s interest in better UI for reviewing patches and in extending the web app from read-only to multi-user write, without server-side key custody.

Performance, Sync & Networking

  • Contributors report very low convergence times on well-seeded repos (sub-second to a few seconds across many nodes).
  • Users can check replication with rad sync status, configure how many nodes must acknowledge a sync, and define especially important peers.
  • Works over IPv6, Tor, Yggdrasil, and clearnet; multi-network setups are possible with appropriate routing.
  • Offline and air-gapped transfer is possible by copying Git storage or using git bundle, though UX is manual.

Moderation, Abuse & “Forgetting”

  • Each node decides what to seed; permissive seeders can be selective or block abusive repos/peers.
  • Private repos are supported via selective replication (not encryption at rest).
  • “Forgetting” and revocation are recognized as hard problems; planned approach is cooperative deletion signals plus safer defaults, but true erasure can’t be guaranteed in a P2P or even centralized world.
  • There is interest in integrating secret scanners to prevent accidental credential pushes.

Trust, Identity & Discovery

  • Repos are governed by identity documents signed by delegate keys (currently SSH-style keys).
  • Radicle doesn’t solve “who to trust” from zero; it aims to make continued trust in known identities stable.
  • Discussion notes parallels with PGP/Web-of-Trust vs PKI: users may still fall back to TOFU and social signaling.
  • Public repo discovery is available via a search gateway, though some want a more prominent, global index.

Comparisons & Ecosystem

  • Versus Tangled: Radicle is fully P2P/local-first; Tangled is built on AT Protocol with client–server “knots” and a central AppView.
  • Versus Forgejo/ActivityPub: Forgejo federates servers; Radicle has no servers or user databases—identities are self-certifying.
  • Some see Radicle as a P2P GitHub/forge; others stress it is “just Git” compatible, with HTTP bridges and mirroring to GitHub/sourcehut via normal remotes.
  • CI exists via an event socket and external brokers; early adopters have custom integrations.

Funding & Governance

  • Radicle is governed by a Swiss non-profit foundation and funded by a separate crypto-oriented organization, but the current protocol is blockchain‑free and usable without any tokens.
  • Debate centers on sustainability of “non-monetizable” P2P forges vs trust risks from VC/crypto funding; proponents frame Radicle as a free software project that can survive on donations and institutional support.