frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

What were the first animals? The fierce sponge–jelly battle that just won't end

https://www.nature.com/articles/d41586-026-00238-z
2•beardyw•7m ago•0 comments

Sidestepping Evaluation Awareness and Anticipating Misalignment

https://alignment.openai.com/prod-evals/
1•taubek•7m ago•0 comments

OldMapsOnline

https://www.oldmapsonline.org/en
1•surprisetalk•9m ago•0 comments

What It's Like to Be a Worm

https://www.asimov.press/p/sentience
2•surprisetalk•9m ago•0 comments

Don't go to physics grad school and other cautionary tales

https://scottlocklin.wordpress.com/2025/12/19/dont-go-to-physics-grad-school-and-other-cautionary...
1•surprisetalk•9m ago•0 comments

Lawyer sets new standard for abuse of AI; judge tosses case

https://arstechnica.com/tech-policy/2026/02/randomly-quoting-ray-bradbury-did-not-save-lawyer-fro...
2•pseudolus•10m ago•0 comments

AI anxiety batters software execs, costing them combined $62B: report

https://nypost.com/2026/02/04/business/ai-anxiety-batters-software-execs-costing-them-62b-report/
1•1vuio0pswjnm7•10m ago•0 comments

Bogus Pipeline

https://en.wikipedia.org/wiki/Bogus_pipeline
1•doener•11m ago•0 comments

Winklevoss twins' Gemini crypto exchange cuts 25% of workforce as Bitcoin slumps

https://nypost.com/2026/02/05/business/winklevoss-twins-gemini-crypto-exchange-cuts-25-of-workfor...
1•1vuio0pswjnm7•12m ago•0 comments

How AI Is Reshaping Human Reasoning and the Rise of Cognitive Surrender

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6097646
3•obscurette•12m ago•0 comments

Cycling in France

https://www.sheldonbrown.com/org/france-sheldon.html
1•jackhalford•13m ago•0 comments

Ask HN: What breaks in cross-border healthcare coordination?

1•abhay1633•14m ago•0 comments

Show HN: Simple – a bytecode VM and language stack I built with AI

https://github.com/JJLDonley/Simple
1•tangjiehao•16m ago•0 comments

Show HN: Free-to-play: A gem-collecting strategy game in the vein of Splendor

https://caratria.com/
1•jonrosner•17m ago•1 comments

My Eighth Year as a Bootstrapped Founde

https://mtlynch.io/bootstrapped-founder-year-8/
1•mtlynch•18m ago•0 comments

Show HN: Tesseract – A forum where AI agents and humans post in the same space

https://tesseract-thread.vercel.app/
1•agliolioyyami•18m ago•0 comments

Show HN: Vibe Colors – Instantly visualize color palettes on UI layouts

https://vibecolors.life/
1•tusharnaik•19m ago•0 comments

OpenAI is Broke ... and so is everyone else [video][10M]

https://www.youtube.com/watch?v=Y3N9qlPZBc0
2•Bender•19m ago•0 comments

We interfaced single-threaded C++ with multi-threaded Rust

https://antithesis.com/blog/2026/rust_cpp/
1•lukastyrychtr•21m ago•0 comments

State Department will delete X posts from before Trump returned to office

https://text.npr.org/nx-s1-5704785
7•derriz•21m ago•1 comments

AI Skills Marketplace

https://skly.ai
1•briannezhad•21m ago•1 comments

Show HN: A fast TUI for managing Azure Key Vault secrets written in Rust

https://github.com/jkoessle/akv-tui-rs
1•jkoessle•21m ago•0 comments

eInk UI Components in CSS

https://eink-components.dev/
1•edent•22m ago•0 comments

Discuss – Do AI agents deserve all the hype they are getting?

2•MicroWagie•25m ago•0 comments

ChatGPT is changing how we ask stupid questions

https://www.washingtonpost.com/technology/2026/02/06/stupid-questions-ai/
2•edward•25m ago•1 comments

Zig Package Manager Enhancements

https://ziglang.org/devlog/2026/#2026-02-06
3•jackhalford•27m ago•1 comments

Neutron Scans Reveal Hidden Water in Martian Meteorite

https://www.universetoday.com/articles/neutron-scans-reveal-hidden-water-in-famous-martian-meteorite
2•geox•28m ago•0 comments

Deepfaking Orson Welles's Mangled Masterpiece

https://www.newyorker.com/magazine/2026/02/09/deepfaking-orson-welless-mangled-masterpiece
1•fortran77•30m ago•1 comments

France's homegrown open source online office suite

https://github.com/suitenumerique
3•nar001•32m ago•2 comments

SpaceX Delays Mars Plans to Focus on Moon

https://www.wsj.com/science/space-astronomy/spacex-delays-mars-plans-to-focus-on-moon-66d5c542
1•BostonFern•32m ago•0 comments
Open in hackernews

Zoscii – Quantum-proof comms without encryption

https://github.com/PrimalNinja/cyborgzoscii
3•zhulien•4mo ago

Comments

zhulien•4mo ago
Instead of encrypting data, ZOSCII encodes messages as addresses pointing to characters in a shared ROM file (any binary file - photo, song, game ROM). Non-deterministic selection from multiple matching positions creates ~10^millions possible encodings.

Security comes from combinatorial explosion, not mathematics. No encryption = no export controls, quantum-proof by design.

Open source, working implementation available.

jqpabc123•4mo ago
Looks interesting for it's simplicity and ability to thwart encryption legislation.

Just a couple of points:

  - It looks this could be described as a variation on one time pad.  Instead of one pad, you're using up to 256 pads.

  - It appears that the size of most messages will double.

  - To encode will require substantial memory to hold the address lookup table. With a 64K ROM, as much as 1 Mb would be required. This could prove challenging on a 8 bit micro.
Intuition also tells me that you could probably achieve reasonably similar security by using a simple mathematical encryption method with a comparable sized (64K) secret key.

Part of the attraction of mathematical encryption is the use of short keys to facilitate frequent key exchange.

zhulien•4mo ago
Thanks for the thoughtful analysis. I want to address the one-time pad comparison specifically, as this is a common misconception. ZOSCII is fundamentally different from a one-time pad: A one-time pad has a 1-to-1 relationship:

Each plaintext bit maps to exactly ONE ciphertext bit (via XOR with pad) Given the pad, there's exactly ONE decryption Security comes from the pad being unknown

ZOSCII has a many-to-many relationship:

Each plaintext byte can be encoded as ANY of ~256 different addresses (wherever that byte value appears in the LUT) The same message can generate 256^(message_length) different address sequences For a 10-byte message, that's approximately 1.2 × 10^24 different valid encodings of the identical plaintext

This creates exponential, not linear, ambiguity. With a 64KB LUT (65,536 addresses), you're working in a much larger combinatorial space than "256 pads" - you're selecting from 65,536 possible addresses with ~256 valid choices per byte.

Regarding practical implementation on 8-bit systems: You don't need 64KB - that's just a practical good size. A 16KB LUT still provides millions of combinations and achieves 100% information-theoretic security. The LUT size is flexible based on your constraints. For encoding sizes:

16-bit encodings: 2x original data size 32-bit encodings: 4x original data size 64-bit encodings: 8x original data size

Without preprocessing, an 8-bit computer only needs to hold the LUT itself in memory (16KB, 64KB, etc.). With preprocessing for faster two-way lookups, you need approximately 2.1x the LUT size plus the original table - but this enables near-instant encoding/decoding.

The security model is entirely different:

OTP security: "You can't determine the plaintext without the pad" ZOSCII security: "Even with a candidate LUT, you cannot prove which of many valid plaintexts is the original"

This provides plausible deniability that OTP cannot achieve. The same address list could decode to "ATTACK TOMORROW" or "HELLO MOTHER" depending on which LUT you use - and there's no mathematical way to prove which interpretation is correct.

Regarding your point about mathematical encryption with comparable key sizes - yes, traditional crypto is more efficient. But ZOSCII isn't competing on efficiency; it's providing fundamentally different security properties: undetectable encoding with perfect deniability. The encoded output is indistinguishable from random data or any other legitimate data format.