Skip to content

Moses-Code-Dev/FoodSecurity-DIFP-Android-Playground

Repository files navigation

FoodSecurity-DIFP-Android-Playground

⚠️ Work in progress — this is a simplified reference implementation. See notices below before using.

Djowda DIFP Android Playground


What This Is

A miniature, open-source reference implementation of one food ecosystem component built on top of the DIFP (Djowda Interconnected Food Protocol) concept.

This playground is intentionally simplified. The production codebase is currently undergoing a sanitization process — a single production component sits at ~250k lines of code. This version strips out production-specific logic so that developers and AI tools can ingest and understand the core architecture without noise.

The full codebase will be released gradually, component by component, at github.com/Djowda over the coming months.


⚠️ Important Notices

🔒 Trademark

The Djowda name and logo are registered trademarks of Djowda. You are free to use, fork, and build on this codebase under the terms of the AGPL-3.0 license, but you may not use the Djowda name, logo, or branding in any derivative product, service, or publication without explicit written permission.


🌐 Web3 / Decentralized Deployment — Read Before You Act

If you are considering deploying this architecture on a blockchain, a permissionless P2P network, or any decentralized infrastructure: please understand what you are doing before you do it.

DIFP's federation model is designed around trusted, identifiable nodes — operators who are accountable and reachable. Deploying blindly onto a permissionless Web3 layer can result in:

  • Uncontrolled federation — unknown nodes joining and routing trades without accountability
  • Identity spoofing — the DID scheme in v0.1 relies on node-level registration trust, not on-chain proofs
  • Undefined network behavior — message propagation and TTL assumptions are not designed for adversarial P2P environments

If you want to explore a Web3-compatible path, follow the community's work and wait for the federation trust layer (Ed25519 message signing — roadmap item A) to be formally specified. Updates will be published at github.com/Djowda and djowda.com/difp.

Rule of thumb: if you can't explain what happens when an untrusted node joins your deployment, don't deploy yet.


📦 Package Name — Required Before Any Public Release

This playground ships with the Djowda package identifier. You MUST rename the package before publishing any derivative app to the Google Play Store, F-Droid, or any other distribution channel.

Failure to do so may result in:

  • Play Store rejection or ban for package name conflicts
  • Confusion with the official Djowda application

To rename the package in Android Studio:

  1. Right-click the root package in the Project view
  2. Select Refactor → Rename
  3. Update applicationId in app/build.gradle
  4. Update namespace if applicable
  5. Sync and rebuild

License

This project is released under the GNU Affero General Public License v3.0 (AGPL-3.0).

Key implications:

  • ✅ You may use, study, modify, and distribute this code freely
  • ✅ You may build commercial products on top of it
  • ⚠️ Any modified version you deploy as a network service must also be released under AGPL-3.0
  • ⚠️ You must preserve copyright notices and license headers

License: AGPL-3.0


Related

Resource Link
DIFP Protocol Specification djowda.com/difp
Full Djowda Codebase (coming) github.com/Djowda
DIFP Protocol Repo github.com/Moses-Code-Dev/difp
Djowda Website djowda.com

Screenshots


© Djowda. Djowda name and logo are trademarks of Djowda.
Released under AGPL-3.0 · Built on DIFP · djowda.com

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages