frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: MemCloud Security Deep Dive – How Devices Safely Share RAM over LAN

https://github.com/vibhanshu2001/memcloud
1•vibhanshugarg•1d ago
MemCloud is a distributed in-memory datastore I built that allows macOS/Linux machines on a LAN to pool their RAM into a shared ephemeral memory cloud. The most common question I received after launching it was: “How is this secure?”

This post is a detailed look at the authentication, encryption, and trust model used in MemCloud. This is not an introduction to the project; it’s a technical deep dive for people interested in protocols, distributed systems, and applied cryptography.

Documentation: https://memcloud.vercel.app/docs/cli

Repo: https://github.com/vibhanshu2001/memcloud

THREAT MODEL MemCloud assumes an untrusted LAN environment and defends against:

device impersonation

MITM attacks

replay attacks

unauthorized cluster joining

handshake/session hijacking

PERSISTENT IDENTITY KEYS (Ed25519) Every node generates a persistent Ed25519 identity keypair stored under ~/.memcloud/identity_key. These keys act like device certificates but without PKI overhead. Identity keys are only used for signing handshake transcripts, never for traffic encryption.

NOISE-STYLE HANDSHAKE (XX PATTERN) MemCloud uses a handshake sequence inspired by the Noise Protocol Framework (XX pattern):

Both sides start unauthenticated

Exchange ephemeral X25519 keys

Exchange random nonces

Build a transcript hash

Exchange encrypted identity proofs

Noise was chosen because it supports TOFU, mutual authentication, identity protection, and forward secrecy in a lightweight format suitable for P2P LAN systems.

TRANSCRIPT HASHING Each handshake message is appended to a transcript hash. This prevents replay, downgrade attempts, message tampering, and cross-session key reuse. The final transcript is mixed into session key derivation.

ENCRYPTED IDENTITY PROOFS Once ephemeral shared secrets are computed, each device signs the transcript hash with its Ed25519 identity key and sends the signature encrypted. Verification is performed against the claimed identity key. If verification fails, the connection is immediately rejected.

SESSION KEY DERIVATION (HKDF + CHACHA20-POLY1305) Session traffic keys are derived from the ephemeral DH shared secret + transcript hash using HKDF. Traffic uses ChaCha20-Poly1305 AEAD, chosen for speed and security on local networks. Every session gets unique traffic keys with forward secrecy.

TOFU (TRUST-ON-FIRST-USE) After cryptographic authentication succeeds, the user must approve the peer the first time it appears:

memcli consent [1] Allow Once [2] Trust Always [3] Deny

Trusted peers are stored in ~/.memcloud/trusted_devices.json. Even after trusting a device, each future session is fully authenticated; impersonation is not possible.

FAILURE MODES MemCloud rejects peers on:

signature mismatch

transcript mismatch

malformed handshake

untrusted identity

consent denial

No RAM quota or block storage rights are granted until after a fully authenticated session is established.

WHY NOT TLS? TLS is great but not ideal for MemCloud because:

It requires PKI, certificates, or a local CA

It is not naturally TOFU-friendly

It adds overhead unnecessary for LAN-bound P2P systems

Noise is simpler to embed directly inside the daemon

Noise-style handshakes offer mutual authentication, identity hiding, forward secrecy, TOFU support, and a lightweight binary format — making it a better fit for a distributed RAM engine.

OPEN QUESTIONS / FEEDBACK WANTED I’d love input on:

better trust revocation models

session resumption

formal verification directions

alternative TOFU approaches

potential attack surfaces I may have missed

This part of the project is evolving, and I’d appreciate thoughts from people who have built secure P2P systems or LAN protocols.

Repo: https://github.com/vibhanshu2001/memcloud

Docs: https://memcloud.vercel.app/docs/cli

The secretive world of North Korean science fiction (2023)

https://arstechnica.com/culture/2023/08/the-strange-secretive-world-of-north-korean-science-fiction/
2•doener•5m ago•0 comments

Windows 3.1 in the Browser

https://www.pcjs.org/software/pcx86/sys/windows/3.10/
2•memalign•6m ago•0 comments

Show HN: Hands on tutorial for open source contribution

https://github.com/firstcontributions/first-contributions
2•promptmike•10m ago•0 comments

New Solitaire Gaming Website

https://www.trysolitaire.com
1•ssmallya•12m ago•0 comments

Show HN: League of Legends AI Assistant (OpenSource)

https://github.com/sorena-ai/LeagueAiCoach
1•legalcriminal•15m ago•0 comments

Gemini with Thinking 3 Pro can't script multi-line string replacement

1•YouAreWRONGtoo•20m ago•0 comments

Can We Really Claim That Civilization is on the Steady Path of Progress?

https://lithub.com/can-we-really-claim-that-civilization-is-on-the-steady-path-of-progress/
3•robtherobber•27m ago•0 comments

Commonplace Book

https://en.wikipedia.org/wiki/Commonplace_book
2•tosh•27m ago•0 comments

Sperm donor with cancer-causing gene fathers nearly 200 children

https://scienceclock.com/sperm-donor-carrying-rare-cancer-causing-gene-fathers-nearly-200-children/
1•ashishgupta2209•27m ago•0 comments

Surgical Masks and Viral Transmission

https://rodgercuddington.substack.com/p/surgical-masks-and-viral-transmission
2•freespirt•28m ago•0 comments

Ask HN: Is there a local dev tool you wish existed because of a repeating issue?

1•johnbros•29m ago•0 comments

Revolutionary gene therapy brings hope of leukaemia cure [video]

https://www.youtube.com/watch?v=IuWFVWwesSE
1•mgh2•35m ago•0 comments

Flow depression treatment now FDA approved

https://www.flowneuroscience.com/fda-approved-lp-2/
1•antfarm•36m ago•0 comments

Oilwell is a wellness app to help you embrace climate chaos

https://oilwell.app/
1•doener•37m ago•0 comments

Show HN: This week we shipped 'Surfaces' on rynk.io

https://twitter.com/farsn_/status/1999764184729551073
1•thefarseen•38m ago•0 comments

Breaking Down Trump's 2025 National Security Strategy

https://www.brookings.edu/articles/breaking-down-trumps-2025-national-security-strategy/
1•thomassmith65•38m ago•0 comments

Ask HN: is Archive.is a Kremlin Asset?

4•leoh•47m ago•1 comments

Kpython – A MicroPython Sidecar for the Linux Kernel (Experimental)

https://github.com/pymergetic/kpython
2•kpython•49m ago•1 comments

What is "involution", China's race-to-the-bottom competition trend

https://www.reuters.com/business/autos-transportation/what-is-involution-chinas-race-to-the-botto...
2•bill38•53m ago•0 comments

50 Years of Proof Assistants

https://lawrencecpaulson.github.io/2025/12/05/History_of_Proof_Assistants.html
1•thunderbong•53m ago•0 comments

Show HN: Clai – Unixlike CLI context feeder for LLMs. Now with recursive tooling

https://github.com/baalimago/clai
1•baalimago•57m ago•0 comments

Technology Radar

https://www.thoughtworks.com/radar
1•pykello•1h ago•0 comments

Public Prompt License (PPL) – prompt-native licensing for LLM prompts

https://shipfail.github.io/public-prompt-license/
1•huan42•1h ago•0 comments

Hetz Demo – build HTML tables online, copy code instantly (no signup)

https://hetz.ct.ws/demo-table/
1•aminekhd•1h ago•2 comments

The military's new AI says boat strike 'unambiguously illegal'

https://san.com/cc/the-militarys-new-ai-says-hypothetical-boat-strike-scenario-unambiguously-ille...
4•saubeidl•1h ago•0 comments

Android PSA: have at least 2 ways of taking your files (especially pictures) out

https://old.reddit.com/r/DataHoarder/comments/1hvowp3/psa_have_at_least_2_ways_of_taking_your_files/
1•sipofwater•1h ago•4 comments

Computer Animator and Amiga fanatic Dick Van Dyke turns 100

5•ggm•1h ago•3 comments

Where Disney Is Heading in Its Next Century [video]

https://www.youtube.com/watch?v=8lfBScCk6R0
1•mgh2•1h ago•0 comments

What's the point of lightweight code with modern computers?

https://liam-on-linux.dreamwidth.org/97426.html
2•jandeboevrie•1h ago•0 comments

Show HN: Zunorm – BYOM Spreadsheet Editor

https://zunorm.com
1•ashv•1h ago•0 comments