That's super cool, especially digging the openship UI! AskUCP started as an experiment as well. Let's see where the world takes us in terms of standards and open/closed/hybrid architectures.
Once we add UCP support to Openfront (our Shopify alternative), would just having a .well-known/ucp be enough to get support on AskUCP? Or would you have to implement some things on your end?
After 10 years in defense tech, watching missile attacks in Ukraine and the Middle East made it clear how little most people really get about air defense. So I'm building this simulator which drops you into the operator’s seat. You can test out different scenarios and build an air defense network against various types of threats (stats from real world). Also have Ukraine, Israel-Iran scenarios.
https://airdefense.dev/
Between resolver.arpa, ipv4only.arpa, and the fact that your email won't be delivered to anywhere you actually care about without in-addr.arpa I'm not sure I'd call it legacy.
Author here. This was a personal project to understand modern air defense that got a bit out of hand. I wanted to see what was possible using only open-source data and a web browser.
Happy to answer any questions about the tech stack or the simulation logic. The campaign mode has some interesting scenarios if you want to give it a try.
After 10 years in defense tech, watching missile attacks in Ukraine and the Middle East made it clear how little most people really get about air defense. So I'm building this simulator which drops you into the operator’s seat. You can test out different scenarios and build an air defense network against various types of threats (stats from real world). Also have Ukraine, Israel-Iran scenarios. The new version is a lot more optimized, thanks in part to feedback from you all in HN.
Currently I am working on a new featureset with missions, where the user is given a budget and geographical area to defend by placing different air defense assets; after which the system attacks it with various missiles and UAVs. Useful for just learning, exercises, playing through scenarios to defend critical infrastructure etc.
After 10 years in defense tech I’m sure you are very aware of this sort of thing, but how worried are you about accidentally leaking some non-public info? I guess one nice thing about public info is, well, it is public, so you can just use whatever’s public.
You'd be surprised how much "secure" info is public somewhere else. Like when you're working on training materials for a certain engine that is considered "military secrets" based on the govt you're doing the work for, that takes literally weeks and weeks to get various design materials, that's considered public information for one of your nation's partners, and you can just download it from them instead of waiting for weeks.
Not that I know from personal experience or anything... /sarc
reply