frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

LicGen – Offline License Generator (CLI and Web UI)

1•tejavvo•27s ago•0 comments

Service Degradation in West US Region

https://azure.status.microsoft/en-gb/status?gsid=5616bb85-f380-4a04-85ed-95674eec3d87&utm_source=...
1•_____k•41s ago•0 comments

The Janitor on Mars

https://www.newyorker.com/magazine/1998/10/26/the-janitor-on-mars
1•evo_9•2m ago•0 comments

Bringing Polars to .NET

https://github.com/ErrorLSC/Polars.NET
2•CurtHagenlocher•4m ago•0 comments

Adventures in Guix Packaging

https://nemin.hu/guix-packaging.html
1•todsacerdoti•5m ago•0 comments

Show HN: We had 20 Claude terminals open, so we built Orcha

1•buildingwdavid•5m ago•0 comments

Your Best Thinking Is Wasted on the Wrong Decisions

https://www.iankduncan.com/engineering/2026-02-07-your-best-thinking-is-wasted-on-the-wrong-decis...
1•iand675•5m ago•0 comments

Warcraftcn/UI – UI component library inspired by classic Warcraft III aesthetics

https://www.warcraftcn.com/
1•vyrotek•6m ago•0 comments

Trump Vodka Becomes Available for Pre-Orders

https://www.forbes.com/sites/kirkogunrinde/2025/12/01/trump-vodka-becomes-available-for-pre-order...
1•stopbulying•8m ago•0 comments

Velocity of Money

https://en.wikipedia.org/wiki/Velocity_of_money
1•gurjeet•10m ago•0 comments

Stop building automations. Start running your business

https://www.fluxtopus.com/automate-your-business
1•valboa•14m ago•1 comments

You can't QA your way to the frontier

https://www.scorecard.io/blog/you-cant-qa-your-way-to-the-frontier
1•gk1•16m ago•0 comments

Show HN: PalettePoint – AI color palette generator from text or images

https://palettepoint.com
1•latentio•16m ago•0 comments

Robust and Interactable World Models in Computer Vision [video]

https://www.youtube.com/watch?v=9B4kkaGOozA
2•Anon84•20m ago•0 comments

Nestlé couldn't crack Japan's coffee market.Then they hired a child psychologist

https://twitter.com/BigBrainMkting/status/2019792335509541220
1•rmason•21m ago•0 comments

Notes for February 2-7

https://taoofmac.com/space/notes/2026/02/07/2000
2•rcarmo•23m ago•0 comments

Study confirms experience beats youthful enthusiasm

https://www.theregister.com/2026/02/07/boomers_vs_zoomers_workplace/
2•Willingham•30m ago•0 comments

The Big Hunger by Walter J Miller, Jr. (1952)

https://lauriepenny.substack.com/p/the-big-hunger
2•shervinafshar•31m ago•0 comments

The Genus Amanita

https://www.mushroomexpert.com/amanita.html
1•rolph•36m ago•0 comments

We have broken SHA-1 in practice

https://shattered.io/
10•mooreds•37m ago•3 comments

Ask HN: Was my first management job bad, or is this what management is like?

1•Buttons840•38m ago•0 comments

Ask HN: How to Reduce Time Spent Crimping?

2•pinkmuffinere•39m ago•0 comments

KV Cache Transform Coding for Compact Storage in LLM Inference

https://arxiv.org/abs/2511.01815
1•walterbell•44m ago•0 comments

A quantitative, multimodal wearable bioelectronic device for stress assessment

https://www.nature.com/articles/s41467-025-67747-9
1•PaulHoule•46m ago•0 comments

Why Big Tech Is Throwing Cash into India in Quest for AI Supremacy

https://www.wsj.com/world/india/why-big-tech-is-throwing-cash-into-india-in-quest-for-ai-supremac...
2•saikatsg•46m ago•0 comments

How to shoot yourself in the foot – 2026 edition

https://github.com/aweussom/HowToShootYourselfInTheFoot
2•aweussom•46m ago•0 comments

Eight More Months of Agents

https://crawshaw.io/blog/eight-more-months-of-agents
4•archb•48m ago•0 comments

From Human Thought to Machine Coordination

https://www.psychologytoday.com/us/blog/the-digital-self/202602/from-human-thought-to-machine-coo...
1•walterbell•48m ago•0 comments

The new X API pricing must be a joke

https://developer.x.com/
1•danver0•49m ago•0 comments

Show HN: RMA Dashboard fast SAST results for monorepos (SARIF and triage)

https://rma-dashboard.bukhari-kibuka7.workers.dev/
1•bumahkib7•50m ago•0 comments
Open in hackernews

Show HN: MemCloud Security Deep Dive – How Devices Safely Share RAM over LAN

https://github.com/vibhanshu2001/memcloud
1•vibhanshugarg•1mo ago
MemCloud is a distributed in-memory datastore I built that allows macOS/Linux machines on a LAN to pool their RAM into a shared ephemeral memory cloud. The most common question I received after launching it was: “How is this secure?”

This post is a detailed look at the authentication, encryption, and trust model used in MemCloud. This is not an introduction to the project; it’s a technical deep dive for people interested in protocols, distributed systems, and applied cryptography.

Documentation: https://memcloud.vercel.app/docs/cli

Repo: https://github.com/vibhanshu2001/memcloud

THREAT MODEL MemCloud assumes an untrusted LAN environment and defends against:

device impersonation

MITM attacks

replay attacks

unauthorized cluster joining

handshake/session hijacking

PERSISTENT IDENTITY KEYS (Ed25519) Every node generates a persistent Ed25519 identity keypair stored under ~/.memcloud/identity_key. These keys act like device certificates but without PKI overhead. Identity keys are only used for signing handshake transcripts, never for traffic encryption.

NOISE-STYLE HANDSHAKE (XX PATTERN) MemCloud uses a handshake sequence inspired by the Noise Protocol Framework (XX pattern):

Both sides start unauthenticated

Exchange ephemeral X25519 keys

Exchange random nonces

Build a transcript hash

Exchange encrypted identity proofs

Noise was chosen because it supports TOFU, mutual authentication, identity protection, and forward secrecy in a lightweight format suitable for P2P LAN systems.

TRANSCRIPT HASHING Each handshake message is appended to a transcript hash. This prevents replay, downgrade attempts, message tampering, and cross-session key reuse. The final transcript is mixed into session key derivation.

ENCRYPTED IDENTITY PROOFS Once ephemeral shared secrets are computed, each device signs the transcript hash with its Ed25519 identity key and sends the signature encrypted. Verification is performed against the claimed identity key. If verification fails, the connection is immediately rejected.

SESSION KEY DERIVATION (HKDF + CHACHA20-POLY1305) Session traffic keys are derived from the ephemeral DH shared secret + transcript hash using HKDF. Traffic uses ChaCha20-Poly1305 AEAD, chosen for speed and security on local networks. Every session gets unique traffic keys with forward secrecy.

TOFU (TRUST-ON-FIRST-USE) After cryptographic authentication succeeds, the user must approve the peer the first time it appears:

memcli consent [1] Allow Once [2] Trust Always [3] Deny

Trusted peers are stored in ~/.memcloud/trusted_devices.json. Even after trusting a device, each future session is fully authenticated; impersonation is not possible.

FAILURE MODES MemCloud rejects peers on:

signature mismatch

transcript mismatch

malformed handshake

untrusted identity

consent denial

No RAM quota or block storage rights are granted until after a fully authenticated session is established.

WHY NOT TLS? TLS is great but not ideal for MemCloud because:

It requires PKI, certificates, or a local CA

It is not naturally TOFU-friendly

It adds overhead unnecessary for LAN-bound P2P systems

Noise is simpler to embed directly inside the daemon

Noise-style handshakes offer mutual authentication, identity hiding, forward secrecy, TOFU support, and a lightweight binary format — making it a better fit for a distributed RAM engine.

OPEN QUESTIONS / FEEDBACK WANTED I’d love input on:

better trust revocation models

session resumption

formal verification directions

alternative TOFU approaches

potential attack surfaces I may have missed

This part of the project is evolving, and I’d appreciate thoughts from people who have built secure P2P systems or LAN protocols.

Repo: https://github.com/vibhanshu2001/memcloud

Docs: https://memcloud.vercel.app/docs/cli