frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

PID Controller

https://en.wikipedia.org/wiki/Proportional%E2%80%93integral%E2%80%93derivative_controller
1•tosh•1m ago•0 comments

SpaceX Rocket Generates 100GW of Power, or 20% of US Electricity

https://twitter.com/AlecStapp/status/2019932764515234159
1•bkls•1m ago•0 comments

Kubernetes MCP Server

https://github.com/yindia/rootcause
1•yindia•2m ago•0 comments

I Built a Movie Recommendation Agent to Solve Movie Nights with My Wife

https://rokn.io/posts/building-movie-recommendation-agent
1•roknovosel•2m ago•0 comments

What were the first animals? The fierce sponge–jelly battle that just won't end

https://www.nature.com/articles/d41586-026-00238-z
2•beardyw•11m ago•0 comments

Sidestepping Evaluation Awareness and Anticipating Misalignment

https://alignment.openai.com/prod-evals/
1•taubek•11m ago•0 comments

OldMapsOnline

https://www.oldmapsonline.org/en
1•surprisetalk•13m ago•0 comments

What It's Like to Be a Worm

https://www.asimov.press/p/sentience
2•surprisetalk•13m ago•0 comments

Don't go to physics grad school and other cautionary tales

https://scottlocklin.wordpress.com/2025/12/19/dont-go-to-physics-grad-school-and-other-cautionary...
1•surprisetalk•13m ago•0 comments

Lawyer sets new standard for abuse of AI; judge tosses case

https://arstechnica.com/tech-policy/2026/02/randomly-quoting-ray-bradbury-did-not-save-lawyer-fro...
2•pseudolus•14m ago•0 comments

AI anxiety batters software execs, costing them combined $62B: report

https://nypost.com/2026/02/04/business/ai-anxiety-batters-software-execs-costing-them-62b-report/
1•1vuio0pswjnm7•14m ago•0 comments

Bogus Pipeline

https://en.wikipedia.org/wiki/Bogus_pipeline
1•doener•15m ago•0 comments

Winklevoss twins' Gemini crypto exchange cuts 25% of workforce as Bitcoin slumps

https://nypost.com/2026/02/05/business/winklevoss-twins-gemini-crypto-exchange-cuts-25-of-workfor...
1•1vuio0pswjnm7•16m ago•0 comments

How AI Is Reshaping Human Reasoning and the Rise of Cognitive Surrender

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6097646
3•obscurette•16m ago•0 comments

Cycling in France

https://www.sheldonbrown.com/org/france-sheldon.html
1•jackhalford•17m ago•0 comments

Ask HN: What breaks in cross-border healthcare coordination?

1•abhay1633•18m ago•0 comments

Show HN: Simple – a bytecode VM and language stack I built with AI

https://github.com/JJLDonley/Simple
1•tangjiehao•20m ago•0 comments

Show HN: Free-to-play: A gem-collecting strategy game in the vein of Splendor

https://caratria.com/
1•jonrosner•21m ago•1 comments

My Eighth Year as a Bootstrapped Founde

https://mtlynch.io/bootstrapped-founder-year-8/
1•mtlynch•22m ago•0 comments

Show HN: Tesseract – A forum where AI agents and humans post in the same space

https://tesseract-thread.vercel.app/
1•agliolioyyami•22m ago•0 comments

Show HN: Vibe Colors – Instantly visualize color palettes on UI layouts

https://vibecolors.life/
2•tusharnaik•23m ago•0 comments

OpenAI is Broke ... and so is everyone else [video][10M]

https://www.youtube.com/watch?v=Y3N9qlPZBc0
2•Bender•23m ago•0 comments

We interfaced single-threaded C++ with multi-threaded Rust

https://antithesis.com/blog/2026/rust_cpp/
1•lukastyrychtr•25m ago•0 comments

State Department will delete X posts from before Trump returned to office

https://text.npr.org/nx-s1-5704785
7•derriz•25m ago•1 comments

AI Skills Marketplace

https://skly.ai
1•briannezhad•25m ago•1 comments

Show HN: A fast TUI for managing Azure Key Vault secrets written in Rust

https://github.com/jkoessle/akv-tui-rs
1•jkoessle•25m ago•0 comments

eInk UI Components in CSS

https://eink-components.dev/
1•edent•26m ago•0 comments

Discuss – Do AI agents deserve all the hype they are getting?

2•MicroWagie•29m ago•0 comments

ChatGPT is changing how we ask stupid questions

https://www.washingtonpost.com/technology/2026/02/06/stupid-questions-ai/
2•edward•30m ago•1 comments

Zig Package Manager Enhancements

https://ziglang.org/devlog/2026/#2026-02-06
3•jackhalford•31m ago•1 comments
Open in hackernews

Building a password-based netcat that works without listening ports or known IPs

https://github.com/threatexpert/gonc
1•gonc•1mo ago

Comments

gonc•1mo ago
Hi HN,

I’ve been experimenting with a different take on netcat-style connectivity and wanted to share the design and trade-offs.

Traditional netcat-like tools assume one side listens on a reachable IP and port. This breaks down when both peers are behind NATs, firewalls, or dynamic networks. Often neither side knows the other’s IP or can expose an inbound port.

The goal is to enable an ad-hoc, netcat-like connection using only a shared secret, without requiring inbound connectivity.

Design goals:

A. Easy to use. No client/server role. Both peers run the same command, e.g. nc -p2p <passphrase>

B. Support nc -e style behavior for executing a program per connection

C. No listening port required

D. No prior knowledge of peer IP or domain

E. Works when both peers are behind NAT

F. Minimal setup and dependencies

G. Familiar stdin/stdout netcat-style usage

Core idea:

Both peers share a high-entropy passphrase. It is never transmitted, and is deterministically used to derive:

(1) A unique MQTT topic as a rendezvous channel (2) A TLS certificate and private key for mutual TLS identity verification

Connection flow:

(1) Each peer derives the MQTT topic and TLS identity from the shared passphrase

(2) Both peers independently establish outbound TCP connections to a public MQTT broker The broker cannot decrypt or interpret messages

(3) Each side performs local STUN probing to discover NAT-mapped addresses

(4) Candidate addresses are exchanged exclusively via the derived MQTT topic

(5) Peers first attempt direct TCP connections

(6) If TCP fails, peers automatically fall back to UDP hole punching As a last resort, a “birthday paradox” strategy is used: one side picks 600 random source ports, the other probes 600 random destination ports

(7) If direct P2P fails, an optional fallback uses an existing SOCKS5 UDP relay, without custom relay protocols

(8) Once a direct path is established, MQTT is no longer used; all traffic flows P2P over mutually authenticated TLS

At no point does either peer need to:

A. Listen on a fixed port

B. Expose or know the peer’s IP or domain

C. Trust the rendezvous infrastructure with plaintext identity or session data

The MQTT broker only observes opaque topic names and encrypted payloads. Without the passphrase, it cannot authenticate, impersonate, or correlate peers.

Security model:

The derived TLS certificate represents a deterministic peer identity, meaningful only to peers sharing the passphrase. Mutual TLS ensures peers cannot be impersonated even if candidate addresses are tampered with.

This is not intended to replace VPNs or general-purpose P2P frameworks. The goal is to explore how little coordination is needed to establish a direct, authenticated channel.

Usage example:

Think of this as a lightweight FRP-style alternative, without a public reverse-proxy or exposed ports.

To reach 10.0.0.1:22 inside a LAN, run on any host:

gonc -p2p <passphrase> -linkagent

Equivalent to:

gonc -p2p <passphrase> -e ":mux linkagent" -keep-open -mqtt-wait

Later, from home:

gonc -p2p <passphrase> -link 3080;3080

Both sides then get a local SOCKS5 proxy to access services on the peer LAN.

Implementation notes:

A. Written in Go

B. Single binary

C. Behaves like netcat (stdin/stdout piping)

D. MQTT is used only for rendezvous, never for data

I’m interested in feedback, especially around NAT edge cases, security assumptions, and alternative rendezvous mechanisms.