frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Model of a Letter of Recommendation of a Person You Are Unacquainted With

https://founders.archives.gov/documents/Franklin/01-23-02-0365
1•tosh•2m ago•0 comments

A polynomial autoencoder beats PCA on transformer embeddings

https://ivanpleshkov.dev/blog/polynomial-autoencoder/
1•timvisee•2m ago•1 comments

Agentic Coding at ClickHouse

https://clickhouse.com/blog/agentic-coding
1•zX41ZdbW•3m ago•0 comments

The Distillation Panic

https://www.interconnects.ai/p/the-distillation-panic
1•pretext•3m ago•0 comments

Fish 4.0: The Fish Of Theseus (2024)

https://fishshell.com/blog/rustport/
2•agluszak•3m ago•0 comments

X-motemen/ghq: Remote repository management

https://github.com/x-motemen/ghq
2•ankitg12•4m ago•0 comments

FileXL – A Large File Transfer Up to 15GB for Free

1•FileXL•5m ago•0 comments

UX Myths (2014)

https://uxmyths.com
2•downbad_•6m ago•1 comments

As Oil Prices Stay High, China Doubles Down on Wind Power

https://www.nytimes.com/2026/05/05/business/china-wind-turbines.html
1•JumpCrisscross•6m ago•0 comments

Farewell to Rails-Way: Prologue

https://paweldabrowski.com/farewell-to-rails-way/prologue
1•pdabrowski6•10m ago•0 comments

Show HN: I needed to animate my Excalidraw -ings for my tech blog

https://marketplace.visualstudio.com/items?itemName=martin-lysk.excaliframe
3•mlysk•12m ago•1 comments

Urme: A search tool for your Claude Code conversations

https://medium.com/@corneliuhoffman/claude-is-dory-urme-is-marlin-02caf433ed7d
1•reborg•13m ago•0 comments

Crypto-miners are quietly colonising computers

https://www.economist.com/science-and-technology/2026/04/22/crypto-miners-are-quietly-colonising-...
1•1vuio0pswjnm7•13m ago•0 comments

Podman-minimal: start using containers on windows, Linux, Mac with one command

https://github.com/vincenzoml/podman-minimal
1•vincenzoml•13m ago•1 comments

Run Claude Cowork against your own cloud inference provider

https://claude.com/docs/cowork/3p/overview
1•pros•14m ago•0 comments

Week one of the Musk vs. Altman trial: What it was like in the room

https://www.technologyreview.com/2026/05/04/1136826/week-one-of-the-musk-v-altman-trial-what-it-w...
1•joozio•17m ago•0 comments

Google AI workers vote to unionise over IDF and US Military tech

https://www.computerweekly.com/news/366642677/Google-AI-workers-vote-to-unionise-over-IDF-and-US-...
2•beardyw•17m ago•0 comments

How to enable post-quantum protection in Proton Mail

https://proton.me/support/mail-post-quantum-protection
1•donohoe•18m ago•0 comments

Google DeepMind workers in UK vote to unionize amid deal with US Military

https://www.theguardian.com/us-news/2026/may/04/google-deepmind-uk-workers-union
4•moxifly7•18m ago•0 comments

A Hidden Liability for U.S. Cities: Looming Infrastructure Repair Costs

https://www.wsj.com/us-news/a-hidden-liability-for-u-s-cities-looming-infrastructure-repair-costs...
1•JumpCrisscross•18m ago•0 comments

Meta stock might look cheap if it weren't for Mark Zuckerberg

https://www.ft.com/content/85732906-e384-4706-be04-644023d18121
1•1vuio0pswjnm7•18m ago•0 comments

Coinbase to cut about 14% of workforce

https://www.reuters.com/business/world-at-work/coinbase-cut-about-14-workforce-2026-05-05/
4•saos•18m ago•2 comments

Using the xAI voice cloning API

https://andrewpwheeler.com/2026/05/04/xai-voice-cloning-api/
1•apwheele•19m ago•0 comments

Foundry Capacity Is Limiting Who Competes at Leading Edge Nodes

https://semiengineering.com/foundries-capacity-is-limiting-who-competes-at-leading-edge-nodes/
1•rbanffy•20m ago•0 comments

DeepSeek V4's indexer OOMs at 65K context. We got it to 1M in 6G

https://arxiv.org/abs/2605.02568
2•OsamaJaber•20m ago•0 comments

As X shuts down Communities, Acorn debuts an alternative

https://techcrunch.com/2026/05/04/as-x-shuts-down-communities-acorn-debuts-an-alternative-that-pu...
1•donohoe•20m ago•0 comments

Explosion Rocks SpaceX's Test of Water Deluge System Ahead of Starship Launch

https://gizmodo.com/explosion-rocks-spacexs-test-of-water-deluge-system-ahead-of-starship-launch-...
1•rbanffy•21m ago•0 comments

How do you defend electron in the memory footprint discussion?

https://docs.voiden.md/docs/getting-started-section/getting-started/why-electron/
1•nikolasdimi•21m ago•2 comments

UnitedHealth to Make It Easier for Patients to Get a Range of Procedures

https://www.wsj.com/health/healthcare/unitedhealth-prior-authorization-278ec87f
2•JumpCrisscross•24m ago•0 comments

Musk to pay $1.5M over SEC Twitter stake case

https://www.latimes.com/business/story/2026-05-04/musk-to-pay-1-5-million-over-sec-twitter-stake-...
2•1vuio0pswjnm7•25m ago•0 comments
Open in hackernews

Ask HN: Why is web auth not a solved issue?

2•zwnow•1y ago
Personally, every project I start, I quit due to not being comfortable with the auth implementation.

I've been into web development for 4 years now. During my research regarding auth in this timeframe, I have found a million reasons on why I should not roll it myself. The reason is always it being to difficult to implement, too much responsibility and basically no matter how I'd do it, it would be unsafe.

The general consensus among web developers seems to be to just let a third party do it. And I understand the reasoning, they are experts and have decades of experience on that specific thing. It makes sense as long as you're fine with third party service dependencies for your application. However, I don't want that. I do not feel comfortable submitting my users data to tech giants for obvious reasons.

I am wondering why it's so difficult to implement secure auth? Why can frameworks like Laravel or Phoenix just generate auth solutions? Why should I trust them, if everyone is saying I shouldn't roll it myself?

After all, if Laravels or Phoenix generated auth isn't safe, I am the one taking responsibility anyway, no?

To my understanding web auth has been an issue for decades now, why aren't there protocols in place to solve it? Or if they are, why aren't they talked about a lot?

Considering how often I read about auth breaches with the big players in the game (Firebase as an example) I am not comfortable trusting third parties with that task either.

So how is one supposed to do it? There are so many JWT tutorials on youtube, but apparently JWTs aren't safe either. Then there are session cookies, which also aren't safe? Why is that?

I am also not talking about authorization. I specifically mean authentication. If I wanted a micro blog platform where users can log into their accounts and write about stuff, how would I make sure it's secure without having to trust third parties, especially big tech companies who repeatedly prove they cant be trusted over and over again?

Comments

arrowsmith•1y ago
> if Laravels or Phoenix generated auth isn't safe

What makes you think they're not safe? Zillions of successful apps have been built using Laravel and Phoenix and (afaik) no-one has hacked their auth code yet. The code is open-source for anyone to inspect for vulnerabilities. I wouldn't feel unsafe using them.

You seem to misunderstand what it means to "roll your own auth".

"Don't roll your own auth" doesn't mean "use a third-party auth provider". It means "use an existing, expert-made auth solution and don't try to write it yourself."

That can be a third-party provider like Firebase, it can be a code dependency like Rails's Devise, it can be generated by `phx.gen.auth` in Phoenix, it doesn't matter - the point is that you're using a tried-and-tested auth solution written by someone who knows what they're doing.

Writing your own auth code is generally a bad idea because it's complicated, time-consuming and easy to get wrong. But there are zillions of off-the-shelf solutions you can use that have been created by security experts and battle-tested in thousands of production apps. As far as I'm concerned, web auth is a solved problem.

zwnow•1y ago
Interesting. When I generate auth for Phoenix the API endpoints are not piped through any security pipes. Only the browser endpoints. Why wouldn't I secure my API endpoints? The same kind of requests that are made for browser requests are sent to the API routes, so this is really confusing.
arrowsmith•1y ago
Ah yes. `phx.gen.auth` generates a cookie-based auth system, which is fine for the :browser pipeline but it's not generally what you want for a JSON API.

The Phoenix docs include a suggestion for how you can extend `phx.gen.auth` to add token-based authentication to your API: https://hexdocs.pm/phoenix/api_authentication.html

(No, this isn't "rolling your own auth" either, it's using someone else's pre-written auth code.)

johncoltrane•1y ago
> The general consensus among web developers seems to be to just let a third party do it.

Outside of personal projects, third-party auth providers must be audited (think GDPR or PIPL), budget must be allowed, contracts signed, etc. so web developers rarely, if ever, have their say on the matter. The decision is taken long before anyone wrote a single line of code. From a project management perspective, it's an easy trade-off to make: one sprint for integrating Okta versus who knows how many for badly implementing something that requires a level of expertise that no one on the team has reached.

For personal projects, the trade-off is a bit different. Resources are scarce so, even if implementing auth is actually not very complicated(1) and can even be quite fun, there are probably more immediately interesting things to do. So you integrate a third-party solution in a wednesday night and you move on.

[1] https://thecopenhagenbook.com/