Notes on building CRDT-based local-first and end-to-end encrypted applications | Dark Hacker News