frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Harvard hired researcher to uncover slavery ties, fires him for finding slaves

https://www.theguardian.com/news/2025/jun/21/harvard-slavery-decendants-of-the-enslaved
1•ryan_j_naughton•1m ago•0 comments

Envoy Proxy Is a Swiss Army Knife

https://adityarohilla.com/2025/06/24/envoy-proxy-the-swiss-army-knife/
1•NerdyAditya•3m ago•0 comments

Trump Administration to End Protections for 58M Acres of National Forests

https://www.nytimes.com/2025/06/23/climate/trump-end-protections-for-58-million-acres-of-national-forests.html
1•insane_dreamer•4m ago•1 comments

"Cryptocalypse": EU demands quantum-safe encryption – partly by 2030

https://www.heise.de/en/news/Cryptocalypse-EU-demands-quantum-safe-encryption-partly-by-2030-10456642.html
1•donutloop•4m ago•0 comments

An attempt at defining consciousness based on information theory [pdf]

https://philpapers.org/go.pl?id=VOGAAA-5&proxyId=&u=https%253A%252F%252Fphilpapers.org%252Farchive%252FVOGAAA-5.pdf
1•Trenthug•4m ago•1 comments

Microsoft confirms Windows 11 automatic deletions of System Restore points

https://www.forbes.com/sites/davidphelan/2025/06/23/microsoft-confirms-windows-11-automatic-deletions-take-action-now-to-protect-yourself/
1•nreece•4m ago•0 comments

Google: A Colorful Quantum Future

https://research.google/blog/a-colorful-quantum-future/
1•donutloop•7m ago•0 comments

Built a newsletter sharing AI tools for dads (feedback wanted)

1•aipapa•8m ago•0 comments

Tesla robotaxi incidents caught on camera in Austin draw regulators' attention

https://www.cnbc.com/2025/06/23/tesla-robotaxi-incidents-caught-on-camera-in-austin-get-nhtsa-concern.html
1•belter•9m ago•0 comments

Erie Insurance Security Incident Update

https://adaptive.live/blog/erie-insurance-network-outage-and-security-incident-what-you-need-to-know
1•debarshri•9m ago•0 comments

Show HN: I built a Cursor for WORD docs using GPT-4

https://breeze-ecru.vercel.app/
1•yashvrma•19m ago•1 comments

Sprite – 2D scene graph for rendering and animation (go lang)

https://pkg.go.dev/golang.org/x/mobile/exp/sprite
1•selvan•21m ago•0 comments

Lifetime Dispersion and Generational GC: An Intellectual Abstract

https://dl.acm.org/doi/10.1145/3735950.3735958
1•matt_d•23m ago•0 comments

Interactive visualization of billions of galaxies from Vera C. Rubin Observatory

https://skyviewer.app/explorer
2•proc0•37m ago•0 comments

Interview with Taika Waititi on making kiwi film 'Boy' [video]

https://www.youtube.com/watch?v=-EsmSgG_NZI
1•keepamovin•45m ago•0 comments

OpenCode

https://opencode.ai/
2•handfuloflight•48m ago•0 comments

Building Ramps to Extend Corgispace

https://blog.vbuckenham.com/building-ramps-to-extend-corgispace-2/
1•tobr•52m ago•0 comments

Format for 200x faster VM disk snapshots

https://cognition.ai/blog/blockdiff
2•suryao•56m ago•0 comments

Good Morning

1•emeriezaiya•57m ago•0 comments

Skip the Design Patterns Architecting with Nouns and Verbs [video]

https://www.youtube.com/watch?v=v-N6r8lcsNc
2•todsacerdoti•1h ago•0 comments

Show HN: A2A Xkcd Agent as per the Spec

https://github.com/hemanth/A2A-XKCD
1•init0•1h ago•0 comments

Batch Inference, Type Systems, and Why Cortex Aisql Got Me Excited

https://kostasp.net/batch-inference-type-systems-and-why-cortex-aisql-got-me-excited/
1•cpard•1h ago•0 comments

Appeals court grants Donald Trump broad powers to deploy troops to US cities

https://theconversation.com/appeals-court-ruling-grants-donald-trump-broad-powers-to-deploy-troops-to-american-cities-258894
2•rstuart4133•1h ago•2 comments

Free tool to audit how AI search engines rank your website

https://www.propensia.ai/
2•LargePanda•1h ago•1 comments

Silkroad Interactive Map

https://en.unesco.org/silkroad/silkroad-interactive-map
2•thunderbong•1h ago•0 comments

Wiley and IEEE Collaborate with Zendy to Drive Ethical AI Through RAG Model

https://zendy.io/blog/wiley-ieee-join-zendys-rag-based-model-as-momentum-builds-among-publishers
1•EmadGinawi•1h ago•1 comments

I vibe coded hypeflo.ws in a few hours

https://pedramnavid.com/blog/llm-workflow-site-build/
2•pinkbeanz•1h ago•0 comments

Perspectiua Corporum Regularium (1568)

https://archive.org/details/gri_33125012889602
1•bulmenisaurus•1h ago•0 comments

Ask HN: How is a company like Astral viable, financially?

4•ashwinsundar•1h ago•0 comments

Open source Ethernet switch – part 2

https://serd.es/2025/06/23/Switch-project-pt2.html
1•purpleidea•1h ago•1 comments
Open in hackernews

Password-Derived Signature Authentication

https://github.com/danieltanfh95/pdsa
3•danieltanfh95•3h ago

Comments

danieltanfh95•3h ago
This is a demo of an authentication approach that combines the familiarity of passwords with the security of digital signatures. Instead of sending passwords to servers, users derive cryptographic key pairs from their passwords and use digital signatures for authentication.

With PDSA, passwords never leave the client device in plaintext and even if the server is breached, attackers cannot impersonate users, so even if users reuse the same password across services the impact to other services using the same password is minimal.

dontdoxxme•2h ago
> even if the server is breached, attackers cannot impersonate users

The weakest link is still the web platform, an attacker can change the JavaScript served.

> even if users reuse the same password across services the impact to other services using the same password is minimal

Failing to understand this argument, if an attacker wants to target the service, they can run the key derivation themselves?

They can also enumerate users because the salt is returned. It says the server should implement rate limiting to stop brute forcing, but that isn't going to help with simple password reuse.

danieltanfh95•47m ago
Are you referring to phishing attacks?

How would they enumerate users through the random salt? Also, are you suggesting that they try to recreate the private key and enumerate through all possible values of the private key…?

Edit: I get what you mean, you are suggesting that since the salt is returned the attacker can still attempt password replay by enumerating through simple values like 0000. That is true. This approach does not improve on that area.