frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

White Noise – secure and private messenger

https://www.whitenoise.chat/
57•onhacker•7h ago

Comments

SeriousM•6h ago
Austria's goverment agreed on spying messengers for the public safety. How does white noise protects itself from getting legally hacked?
shark_laser•2h ago
White Noise is open source, and built on Nostr, a decentralised and open protocol.

Run your own fork if you don't trust this one.

hiimkeks•6h ago
Congratulations on the release!

As someone who used to be in the Secure Scuttlebutt community an now works on OpenMLS, I wonder how they (you?) deal with concurrency of Commit messages. I spent quite some time thinking about ways to detect and resolve forks, and the current iteration of MLS doesn't really have good answers here.

miloignis•2h ago
I looked up the spec, and it seems like they just tiebreak on time and hash and throw away the losing commit:

https://github.com/nostr-protocol/nips/blob/001c516f72943081...

heavyset_go•5h ago
> White Noise stands out by merging Nostr’s decentralized network with advanced encryption.

How does White Noise address criticisms surrounding Nostr's implementation[1]:

> While nostr offers the ability to send encrypted DMs to user pubkeys, the metadata of these messages are broadcast publicly via relays. This is the same as a bitcoin transaction being viewable on the public ledger. The contents of the direct message will be encrypted, but other metadata like the sender and recipient can be viewed by anyone.

Even assuming if metadata is encrypted, does WN's implementation broadcast messages across public relays?

If you can map out social networks based on publicly available data, can tell if one user messages another, or correlate when messages were sent to/from whom, I would not call that private.

[1] https://ron.stoner.com/nostr_Security_and_Privacy/

EGreg•3h ago
So you wouldn't call Signal private, right? Just wanted consistency.
collinmcnulty•3h ago
Signal has sealed sender. So you can tell that a phone number is a signal user but not who they message.
rendaw•1h ago
How does sealed sender work? I couldn't find details. The explanations I saw seemed to start from the assumption that Signal doesn't keep logs of messages moving through their system.
hugs•3h ago
(fwiw, I'm not the creator of this, but am a casual user of Nostr...)

tl;dr: the answer you're looking for is probably in the explainer doc [1].

At its core, Nostr is simple: it's "just" JSON over WebSockets. But there are dozens of optional proposals to add additional functionality. And a few of those proposals are related to encrypted DMs, specifically, NIP-04 [2], and NIP-17 [3]. Most of the online criticism of encrypted DMs on Nostr is about NIP-04 (which is why it's deprecated.)

White Noise is using a different encryption standard: MLS (Messaging Layer Security) [4]. They explicitly say in their docs: "White Noise is an implementation of the NIP-EE spec." [5]. The NIP-EE proposal itself is on GitHub [6]. The explainer doc [1] I first mentioned is linked to from the proposal [6].

This is all to say: given all the links I posted here, an AI chatbot could probably give you a better answer using the prompt: "How is NIP-EE (Messaging Layer Security for Nostr) different or better than NIP-04 or NIP-17?"

(I'm a little surprised that wasn't already in the FAQ for the project.)

  [1]: https://github.com/nostr-protocol/nips/blob/001c516f7294308143515a494a35213fc45978df/EE.md
  [2]: https://github.com/nostr-protocol/nips/blob/master/04.md
  [3]: https://github.com/nostr-protocol/nips/blob/master/17.md
  [4]: https://www.rfc-editor.org/rfc/rfc9420.html
  [5]: https://github.com/parres-hq/whitenoise?tab=readme-ov-file#the-spec
  [6]: https://github.com/nostr-protocol/nips/pull/1427
shark_laser•3h ago
This criticism of Nostr is quite outdated.

I haven't looked into the White Noise code, but Gift Wrapping is just one way this issue was solved a long time ago: https://nips.nostr.com/59

SchemaLoad•1h ago
There was a project called Bitmessage which solved this problem by not having a recipient field. Your client would just try to decrypt everything, and when it succeeds, that means the message is for you.

The then immediate issue is routing becomes very inefficient since every node now needs to receive and attempt to decrypt every single message. Which they solved by having channels to split up the network and only require decrypting of every message on the same channel as your address.

ktallett•4h ago
As much as I love the idea of these secure messaging apps, until I see how a company responds to government intimidation I am always wary of being too invested and trustworthy of the marketing.
patchtopic•4h ago
interesting but still very alpha. It doesn't have any desktop/PC clients yet, but I assume it will?
hackernudes•3h ago
Looks like a flutter app that can build for desktop Linux https://github.com/parres-hq/whitenoise_flutter .

I started my reply thinking it was still using Tauru but apparently things change fast!

globalnode•4h ago
i admit i havent looked at the app, but i assume is centrally run.

firstly: i think the only way secure p2p messaging can work is if its decentralised. no 3rd parties to communication, how this would be done i have no idea. maybe like email but without the server?

secondly: you'd need to ensure a secure os on each end that you can trust to not take screenshots and send to hq before transmission or after reception.

since its not possible to use the internet without a source ip. its almost provably insecure (in terms of privacy), no matter what protocols are dreamed up. a 3rd party will have to be trusted to distribute packets. and thats the weak point. (unless you force the source IP to be 0.0.0.0 or something before it goes out)

couldnt we just use dns to point to recipients, force zero the source ip and send udp packets directly?

what about pgp through a tor relay?

botanical76•4h ago
As I understand it, it's just a nostr client, so it uses nostr's decentralized network of relays.
shark_laser•3h ago
This is decentralised as it runs on Nostr.

Nostr can run over TOR.

esafak•3h ago
Apparently it uses a new protocol called https://en.wikipedia.org/wiki/Messaging_Layer_Security
skeptrune•2h ago
Wow, Nostr is back in vogue on the all time highs?
journal•2h ago
title: secure and private terms: we're not responsible
gblargg•28m ago
Software advertising itself as "A truly secure and private messenger" raises my skepticism. It might be truly secure. Its creators might believe it is and have zero doubt that they've made no errors and there are no flaws. Or it is neither and they want me to think it's those things. The only thing definite is that it claims to be truly secure.

Claude Opus 4 worse than Sonnet on Kotlin Bench

https://firebender.com/blog/kotlin-bench
1•kevo1ution•1m ago•0 comments

Most comprehensive review of AI coding agents for Kotlin/Android tasks

https://www.jasonpearson.dev/ai-code-assistants-for-android-engineers/
1•kevo1ution•6m ago•0 comments

The Unreasonable Effectiveness of Recurrent Neural Networks

http://karpathy.github.io/2015/05/21/rnn-effectiveness/
1•gone35•6m ago•0 comments

Built Podflyy.com, a NoteBookLM Alternative – Is There PMF?

1•alexreysa•6m ago•0 comments

Cell phone surveillance detected at anti-ICE protest

https://san.com/cc/exclusive-evidence-of-cell-phone-surveillance-detected-at-anti-ice-protest/
1•harambae•7m ago•0 comments

One Source of Truth for AI (by Android engineer)

https://kau.sh/blog/agents-md/
1•kevo1ution•8m ago•0 comments

Pliny the Liberator 󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾: Here's the new Grok 4 system prompt

https://twitter.com/elder_plinius/status/1943171871400194231
1•JnBrymn•8m ago•0 comments

Japan focusing on fix for smart-phone related eye condition

https://english.kyodonews.net/articles/-/56823
1•anigbrowl•9m ago•0 comments

RVISmith: Fuzzing Compilers for RVV (RISC-V Vector Extension) Intrinsics

https://arxiv.org/abs/2507.03773
1•matt_d•9m ago•0 comments

Strategy

https://rohitgupta.in/blog/2025/07/10/Strategy/
1•gogo61•12m ago•0 comments

German court rules Meta tracking technology violates European privacy laws

https://therecord.media/german-court-meta-tracking-tech
5•bundie•13m ago•0 comments

GTA1: A Test-Time Scaled GUI Agent Outperforms OpenAI's CUA

https://wmsglobe.blogspot.com/2025/07/salesforce-ai-released-gta1-test-time.html
1•miclys•14m ago•1 comments

Show HN: Toolbox: Run FFmpeg, Imagemagick, 7Zip and Friends in the Browser

https://toolbox.computer/
1•Pharaoh2•15m ago•0 comments

Elephants Say They Like Them Apples

https://www.nytimes.com/2025/07/09/science/elephants-gesturing-trunk.html
1•tintinnabula•16m ago•0 comments

Polymarket faces manipulation allegations on $58M Zelenskyy suit bet

https://crypto.news/polymarket-manipulation-58m-zelenskyy-suit-bet-2025/
1•theogravity•16m ago•0 comments

We're Leaving Delaware, and We Think You Should Consider Leaving Too

https://a16z.com/were-leaving-delaware-and-we-think-you-should-consider-leaving-too/
2•zugi•21m ago•0 comments

ARC-AGI Leaderboard

https://arcprize.org/leaderboard
3•georgehill•21m ago•0 comments

ChatGPT and Co in Practical Testing

https://www.study-from-here.com/2025/07/chatgpt-co-in-practical-testing.html
1•BhattMayurJ•23m ago•0 comments

March of AI could prompt a white-collar revolt

https://www.thetimes.com/comment/columnists/article/march-of-ai-could-prompt-a-white-collar-revolt-jqrvs7cfh
1•petethomas•24m ago•1 comments

A Survey on Latent Reasoning

https://huggingface.co/papers/2507.06203
1•JnBrymn•25m ago•0 comments

FAANG Interview Secrets: What Top Tech Companies Look for (Updated for 2025)

https://www.repediaai.com/blog/faang-interview-secrets
1•ShunLi•34m ago•0 comments

Red Flag Interview Questions Across Industries 2025

https://www.repediaai.com/blog/interview-red-flags-2025
1•ShunLi•35m ago•0 comments

I'm 16 and Built 700 Coding Projects for Fun – Here's What I Learned

1•RajGuruYadav•35m ago•1 comments

Historical of Reflected Vulnerabilities: Evolution of Windows Defender Defenses

https://substack.com/home/post/p-167963207
1•vinhatson•42m ago•1 comments

Programming Well: Abstraction and Design in Computation

https://book.cs51.io/
1•swatson741•44m ago•0 comments

A Bigger Database

https://blog.glyph.im/2025/03/a-bigger-database.html
1•pabs3•47m ago•0 comments

Classic Connect 2

https://moonlit.market/
1•strange-poster•51m ago•0 comments

Enchanting, but Not Magical: A Statement on the Tokenization of Securities

https://www.sec.gov/newsroom/speeches-statements/peirce-statement-tokenized-securities-070925
2•yoyoJosh•53m ago•0 comments

Show HN: Shortly – A privacy-focused URL shortener with analytics

https://shortly.streamlab.in
1•parthomal•54m ago•0 comments

A pseudo-infinite realtime canvas with 416M individually-drawn pixels

https://everyonedraw.com/canvas
1•seangransee•55m ago•0 comments