frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Claude Code Controller

https://github.com/The-Vibe-Company/claude-code-controller
1•shidhincr•3m ago•0 comments

Software design is now cheap

https://dottedmag.net/blog/cheap-design/
1•dottedmag•3m ago•0 comments

Show HN: Are You Random? – A game that predicts your "random" choices

https://github.com/OvidijusParsiunas/are-you-random
1•ovisource•8m ago•0 comments

Poland to probe possible links between Epstein and Russia

https://www.reuters.com/world/poland-probe-possible-links-between-epstein-russia-pm-tusk-says-202...
1•doener•16m ago•0 comments

Effectiveness of AI detection tools in identifying AI-generated articles

https://www.ijoms.com/article/S0901-5027(26)00025-1/fulltext
1•XzetaU8•22m ago•0 comments

Warsaw Circle

https://wildtopology.com/bestiary/warsaw-circle/
1•hackandthink•23m ago•0 comments

Reverse Engineering Raiders of the Lost Ark for the Atari 2600

https://github.com/joshuanwalker/Raiders2600
1•pacod•28m ago•0 comments

The AI4Agile Practitioners Report 2026

https://age-of-product.com/ai4agile-practitioners-report-2026/
1•swolpers•29m ago•0 comments

Digital Independence Day

https://di.day/
1•pabs3•33m ago•0 comments

What a bot hacking attempt looks like: SQL injections galore

https://old.reddit.com/r/vibecoding/comments/1qz3a7y/what_a_bot_hacking_attempt_looks_like_i_set_up/
1•cryptoz•34m ago•0 comments

Show HN: FlashMesh – An encrypted file mesh across Google Drive and Dropbox

https://flashmesh.netlify.app
1•Elevanix•35m ago•0 comments

Show HN: AgentLens – Open-source observability and audit trail for AI agents

https://github.com/amitpaz1/agentlens
1•amit_paz•36m ago•0 comments

Show HN: ShipClaw – Deploy OpenClaw to the Cloud in One Click

https://shipclaw.app
1•sunpy•38m ago•0 comments

Unlock the Power of Real-Time Google Trends Visit: Www.daily-Trending.org

https://daily-trending.org
1•azamsayeedit•40m ago•1 comments

Explanation of British Class System

https://www.youtube.com/watch?v=Ob1zWfnXI70
1•lifeisstillgood•41m ago•0 comments

Show HN: Jwtpeek – minimal, user-friendly JWT inspector in Go

https://github.com/alesr/jwtpeek
1•alesrdev•44m ago•0 comments

Willow – Protocols for an uncertain future [video]

https://fosdem.org/2026/schedule/event/CVGZAV-willow/
1•todsacerdoti•46m ago•0 comments

Feedback on a client-side, privacy-first PDF editor I built

https://pdffreeeditor.com/
1•Maaz-Sohail•49m ago•0 comments

Clay Christensen's Milkshake Marketing (2011)

https://www.library.hbs.edu/working-knowledge/clay-christensens-milkshake-marketing
2•vismit2000•56m ago•0 comments

Show HN: WeaveMind – AI Workflows with human-in-the-loop

https://weavemind.ai
9•quentin101010•1h ago•2 comments

Show HN: Seedream 5.0: free AI image generator that claims strong text rendering

https://seedream5ai.org
1•dallen97•1h ago•0 comments

A contributor trust management system based on explicit vouches

https://github.com/mitchellh/vouch
2•admp•1h ago•1 comments

Show HN: Analyzing 9 years of HN side projects that reached $500/month

3•haileyzhou•1h ago•1 comments

The Floating Dock for Developers

https://snap-dock.co
2•OsamaJaber•1h ago•0 comments

Arcan Explained – A browser for different webs

https://arcan-fe.com/2026/01/26/arcan-explained-a-browser-for-different-webs/
2•walterbell•1h ago•0 comments

We are not scared of AI, we are scared of irrelevance

https://adlrocha.substack.com/p/adlrocha-we-are-not-scared-of-ai
1•adlrocha•1h ago•0 comments

Quartz Crystals

https://www.pa3fwm.nl/technotes/tn13a.html
2•gtsnexp•1h ago•0 comments

Show HN: I built a free dictionary API to avoid API keys

https://github.com/suvankar-mitra/free-dictionary-rest-api
2•suvankar_m•1h ago•0 comments

Show HN: Kybera – Agentic Smart Wallet with AI Osint and Reputation Tracking

https://kybera.xyz
3•xipz•1h ago•0 comments

Show HN: brew changelog – find upstream changelogs for Homebrew packages

https://github.com/pavel-voronin/homebrew-changelog
1•kolpaque•1h ago•0 comments
Open in hackernews

EchoVaults - Digital Vaults for loved ones in emergency situations.

https://echovaults.org/
2•Kynsofficial•6mo ago

Comments

Kynsofficial•6mo ago
EchoVaults is an offline-first, encrypted legacy vault that stores your final wishes, messages, and important information — accessible only in case of death, disappearance, or emergency. It doesn’t rely on servers, cloud, or biometrics. It runs 100% on-device, with zero internet exposure, and uses AES-256-GCM with PBKDF2 encryption. Once set up, no account is needed, and it operates without any background activity or data collection.
r0n22•6mo ago
Very cool!

I'm like the idea but the site does not let me know how it works after I die? How does the other person gets access to the vault?

k310•6mo ago
Also curious about this. There seems to be a master password and a bunch of questions. Presumably (I looked around) one transfers these.

Now, there have been cases of seniors being conned into signing away power of attorney. If this is detected, how can the owner change the authorization?

And if used by seniors (I am one, OK) how can they remember the password/questions other than a password manager app (which requires a password) or printing them out and saving in a lockbox? And then there’s access to the key …

Anyway, granting access seems to be the entire point of this, and I didn’t see it addressed “job one” on a quick run through the website. Then again, I’m a senior …

Kynsofficial•6mo ago
Thank you for asking — this is one of the most important questions we get, and it goes to the very heart of how EchoVaults was designed: to remain private, accessible only by you, and—if needed—discoverable by someone you trust, without ever relying on cloud syncing or external servers.

We don’t use any "secret" internet triggers or remote unlock mechanisms, which are often vulnerable, difficult to test, or dependent on the existence of external infrastructure long after the user has passed. Instead, EchoVaults is fully offline and built on a human-first model of trust, clarity, and layered security.

Here’s how access works after death, step-by-step:

-1. Persistent Lock Screen Instruction (You Set This) During setup, EchoVaults lets you write a permanent message that stays visible on your phone’s lock screen.

This message should guide whoever finds your phone — for example:

“If I’m no longer around, please contact [Name]. They know how to access EchoVaults. Use the codeword: ‘River’.”

This is how your intent survives you, in a form any first responder or family member can understand without needing to unlock anything yet.

-2. They Must Unlock Your Phone (First Layer of Defense) EchoVaults doesn’t bypass or weaken your device’s native security.

The person you trust must already know your phone passcode. We don’t encourage storing or sharing this casually — but if you’re planning for emergencies or death, this is the only real-world viable method.

On both iOS and Android, over 90% of phone theft attempts fail precisely because this passcode layer is so difficult to break. In most jurisdictions, even Apple themselves can’t unlock a phone without a court order — and sometimes, not even then.

-3. EchoVaults: Status Check + Identity Challenge (Second Layer) Once the phone is unlocked and EchoVaults is opened:

The app prompts: “Are you the original user?” or “Has the user passed away?”

If the responder selects “User has passed away”, they’re presented with a 5-question identity challenge, created by you during setup.

These are not generic security questions — they are deeply personal ones only someone close to you can answer (e.g. “What nickname did my mom call me?” or “Where did I hide my emergency note in 2023?”).

You can optionally give this trusted person an encrypted PDF containing these questions and answers in advance, stored safely offline or physically printed.

-4. Access Level and Delayed Vault Reveal Once the correct answers are given:

The trusted person gains access only to the vaults you've marked as “Basic” — typically containing general guidance, will instructions, or useful information for your family.

For vaults marked “Sensitive”, access is delayed based on the wait period you choose — this could be 24 hours, or even weeks, months, or years.

For vaults marked as "Ultra-Sensitive" no one can see this except you, even when trusted person correctly answers your security questions, the vaults in this privacy level will never be visible to them.

After that wait period passes (and only if you don’t cancel the unlock, in case of false positive or mistaken access), the app reveals the sensitive vault.

The delay serves as a grace window: If you’re still alive and access was accidental, you can cancel it. If you’ve truly passed away, it proceeds in a dignified, secure, and planned way.

-Security Model EchoVaults was built with the following principles:

100% offline: No cloud, no syncing, no tracking, no server dependency. Your data stays on your device.

Tamper-resistant encryption: AES-256-GCM with PBKDF2 key derivation, same used in secure password managers and military-grade systems.

Human-readable recovery: All instructions are visible, understandable, and usable by your family or loved ones without technical knowledge.

This is how EchoVaults answers the hardest question: “If I’m gone, how will the people I love access what I left behind — and only them?” Without compromising on privacy, encryption, or simplicity.