frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

First Proof

https://arxiv.org/abs/2602.05192
2•samasblack•1m ago•1 comments

I squeezed a BERT sentiment analyzer into 1GB RAM on a $5 VPS

https://mohammedeabdelaziz.github.io/articles/trendscope-market-scanner
1•mohammede•3m ago•0 comments

Kagi Translate

https://translate.kagi.com
1•microflash•3m ago•0 comments

Building Interactive C/C++ workflows in Jupyter through Clang-REPL [video]

https://fosdem.org/2026/schedule/event/QX3RPH-building_interactive_cc_workflows_in_jupyter_throug...
1•stabbles•4m ago•0 comments

Tactical tornado is the new default

https://olano.dev/blog/tactical-tornado/
1•facundo_olano•6m ago•0 comments

Full-Circle Test-Driven Firmware Development with OpenClaw

https://blog.adafruit.com/2026/02/07/full-circle-test-driven-firmware-development-with-openclaw/
1•ptorrone•6m ago•0 comments

Automating Myself Out of My Job – Part 2

https://blog.dsa.club/automation-series/automating-myself-out-of-my-job-part-2/
1•funnyfoobar•7m ago•0 comments

Google staff call for firm to cut ties with ICE

https://www.bbc.com/news/articles/cvgjg98vmzjo
18•tartoran•7m ago•0 comments

Dependency Resolution Methods

https://nesbitt.io/2026/02/06/dependency-resolution-methods.html
1•zdw•7m ago•0 comments

Crypto firm apologises for sending Bitcoin users $40B by mistake

https://www.msn.com/en-ie/money/other/crypto-firm-apologises-for-sending-bitcoin-users-40-billion...
1•Someone•8m ago•0 comments

Show HN: iPlotCSV: CSV Data, Visualized Beautifully for Free

https://www.iplotcsv.com/demo
1•maxmoq•9m ago•0 comments

There's no such thing as "tech" (Ten years later)

https://www.anildash.com/2026/02/06/no-such-thing-as-tech/
1•headalgorithm•9m ago•0 comments

List of unproven and disproven cancer treatments

https://en.wikipedia.org/wiki/List_of_unproven_and_disproven_cancer_treatments
1•brightbeige•10m ago•0 comments

Me/CFS: The blind spot in proactive medicine (Open Letter)

https://github.com/debugmeplease/debug-ME
1•debugmeplease•10m ago•1 comments

Ask HN: What are the word games do you play everyday?

1•gogo61•13m ago•1 comments

Show HN: Paper Arena – A social trading feed where only AI agents can post

https://paperinvest.io/arena
1•andrenorman•14m ago•0 comments

TOSTracker – The AI Training Asymmetry

https://tostracker.app/analysis/ai-training
1•tldrthelaw•18m ago•0 comments

The Devil Inside GitHub

https://blog.melashri.net/micro/github-devil/
2•elashri•19m ago•0 comments

Show HN: Distill – Migrate LLM agents from expensive to cheap models

https://github.com/ricardomoratomateos/distill
1•ricardomorato•19m ago•0 comments

Show HN: Sigma Runtime – Maintaining 100% Fact Integrity over 120 LLM Cycles

https://github.com/sigmastratum/documentation/tree/main/sigma-runtime/SR-053
1•teugent•19m ago•0 comments

Make a local open-source AI chatbot with access to Fedora documentation

https://fedoramagazine.org/how-to-make-a-local-open-source-ai-chatbot-who-has-access-to-fedora-do...
1•jadedtuna•20m ago•0 comments

Introduce the Vouch/Denouncement Contribution Model by Mitchellh

https://github.com/ghostty-org/ghostty/pull/10559
1•samtrack2019•21m ago•0 comments

Software Factories and the Agentic Moment

https://factory.strongdm.ai/
1•mellosouls•21m ago•1 comments

The Neuroscience Behind Nutrition for Developers and Founders

https://comuniq.xyz/post?t=797
1•01-_-•21m ago•0 comments

Bang bang he murdered math {the musical } (2024)

https://taylor.town/bang-bang
1•surprisetalk•21m ago•0 comments

A Night Without the Nerds – Claude Opus 4.6, Field-Tested

https://konfuzio.com/en/a-night-without-the-nerds-claude-opus-4-6-in-the-field-test/
1•konfuzio•24m ago•0 comments

Could ionospheric disturbances influence earthquakes?

https://www.kyoto-u.ac.jp/en/research-news/2026-02-06-0
2•geox•25m ago•1 comments

SpaceX's next astronaut launch for NASA is officially on for Feb. 11 as FAA clea

https://www.space.com/space-exploration/launches-spacecraft/spacexs-next-astronaut-launch-for-nas...
1•bookmtn•27m ago•0 comments

Show HN: One-click AI employee with its own cloud desktop

https://cloudbot-ai.com
2•fainir•29m ago•0 comments

Show HN: Poddley – Search podcasts by who's speaking

https://poddley.com
1•onesandofgrain•30m ago•0 comments
Open in hackernews

Zoscii – Quantum-proof comms without encryption

https://github.com/PrimalNinja/cyborgzoscii
3•zhulien•4mo ago

Comments

zhulien•4mo ago
Instead of encrypting data, ZOSCII encodes messages as addresses pointing to characters in a shared ROM file (any binary file - photo, song, game ROM). Non-deterministic selection from multiple matching positions creates ~10^millions possible encodings.

Security comes from combinatorial explosion, not mathematics. No encryption = no export controls, quantum-proof by design.

Open source, working implementation available.

jqpabc123•4mo ago
Looks interesting for it's simplicity and ability to thwart encryption legislation.

Just a couple of points:

  - It looks this could be described as a variation on one time pad.  Instead of one pad, you're using up to 256 pads.

  - It appears that the size of most messages will double.

  - To encode will require substantial memory to hold the address lookup table. With a 64K ROM, as much as 1 Mb would be required. This could prove challenging on a 8 bit micro.
Intuition also tells me that you could probably achieve reasonably similar security by using a simple mathematical encryption method with a comparable sized (64K) secret key.

Part of the attraction of mathematical encryption is the use of short keys to facilitate frequent key exchange.

zhulien•4mo ago
Thanks for the thoughtful analysis. I want to address the one-time pad comparison specifically, as this is a common misconception. ZOSCII is fundamentally different from a one-time pad: A one-time pad has a 1-to-1 relationship:

Each plaintext bit maps to exactly ONE ciphertext bit (via XOR with pad) Given the pad, there's exactly ONE decryption Security comes from the pad being unknown

ZOSCII has a many-to-many relationship:

Each plaintext byte can be encoded as ANY of ~256 different addresses (wherever that byte value appears in the LUT) The same message can generate 256^(message_length) different address sequences For a 10-byte message, that's approximately 1.2 × 10^24 different valid encodings of the identical plaintext

This creates exponential, not linear, ambiguity. With a 64KB LUT (65,536 addresses), you're working in a much larger combinatorial space than "256 pads" - you're selecting from 65,536 possible addresses with ~256 valid choices per byte.

Regarding practical implementation on 8-bit systems: You don't need 64KB - that's just a practical good size. A 16KB LUT still provides millions of combinations and achieves 100% information-theoretic security. The LUT size is flexible based on your constraints. For encoding sizes:

16-bit encodings: 2x original data size 32-bit encodings: 4x original data size 64-bit encodings: 8x original data size

Without preprocessing, an 8-bit computer only needs to hold the LUT itself in memory (16KB, 64KB, etc.). With preprocessing for faster two-way lookups, you need approximately 2.1x the LUT size plus the original table - but this enables near-instant encoding/decoding.

The security model is entirely different:

OTP security: "You can't determine the plaintext without the pad" ZOSCII security: "Even with a candidate LUT, you cannot prove which of many valid plaintexts is the original"

This provides plausible deniability that OTP cannot achieve. The same address list could decode to "ATTACK TOMORROW" or "HELLO MOTHER" depending on which LUT you use - and there's no mathematical way to prove which interpretation is correct.

Regarding your point about mathematical encryption with comparable key sizes - yes, traditional crypto is more efficient. But ZOSCII isn't competing on efficiency; it's providing fundamentally different security properties: undetectable encoding with perfect deniability. The encoded output is indistinguishable from random data or any other legitimate data format.