frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

NASA now allowing astronauts to bring their smartphones on space missions

https://twitter.com/NASAAdmin/status/2019259382962307393
1•gbugniot•2m ago•0 comments

Claude Code Is the Inflection Point

https://newsletter.semianalysis.com/p/claude-code-is-the-inflection-point
1•throwaw12•3m ago•0 comments

MicroClaw – Agentic AI Assistant for Telegram, Built in Rust

https://github.com/microclaw/microclaw
1•everettjf•4m ago•2 comments

Show HN: Omni-BLAS – 4x faster matrix multiplication via Monte Carlo sampling

https://github.com/AleatorAI/OMNI-BLAS
1•LowSpecEng•4m ago•1 comments

The AI-Ready Software Developer: Conclusion – Same Game, Different Dice

https://codemanship.wordpress.com/2026/01/05/the-ai-ready-software-developer-conclusion-same-game...
1•lifeisstillgood•6m ago•0 comments

AI Agent Automates Google Stock Analysis from Financial Reports

https://pardusai.org/view/54c6646b9e273bbe103b76256a91a7f30da624062a8a6eeb16febfe403efd078
1•JasonHEIN•10m ago•0 comments

Voxtral Realtime 4B Pure C Implementation

https://github.com/antirez/voxtral.c
1•andreabat•12m ago•0 comments

I Was Trapped in Chinese Mafia Crypto Slavery [video]

https://www.youtube.com/watch?v=zOcNaWmmn0A
1•mgh2•18m ago•0 comments

U.S. CBP Reported Employee Arrests (FY2020 – FYTD)

https://www.cbp.gov/newsroom/stats/reported-employee-arrests
1•ludicrousdispla•20m ago•0 comments

Show HN: I built a free UCP checker – see if AI agents can find your store

https://ucphub.ai/ucp-store-check/
2•vladeta•25m ago•1 comments

Show HN: SVGV – A Real-Time Vector Video Format for Budget Hardware

https://github.com/thealidev/VectorVision-SVGV
1•thealidev•27m ago•0 comments

Study of 150 developers shows AI generated code no harder to maintain long term

https://www.youtube.com/watch?v=b9EbCb5A408
1•lifeisstillgood•27m ago•0 comments

Spotify now requires premium accounts for developer mode API access

https://www.neowin.net/news/spotify-now-requires-premium-accounts-for-developer-mode-api-access/
1•bundie•30m ago•0 comments

When Albert Einstein Moved to Princeton

https://twitter.com/Math_files/status/2020017485815456224
1•keepamovin•31m ago•0 comments

Agents.md as a Dark Signal

https://joshmock.com/post/2026-agents-md-as-a-dark-signal/
2•birdculture•33m ago•0 comments

System time, clocks, and their syncing in macOS

https://eclecticlight.co/2025/05/21/system-time-clocks-and-their-syncing-in-macos/
1•fanf2•34m ago•0 comments

McCLIM and 7GUIs – Part 1: The Counter

https://turtleware.eu/posts/McCLIM-and-7GUIs---Part-1-The-Counter.html
2•ramenbytes•37m ago•0 comments

So whats the next word, then? Almost-no-math intro to transformer models

https://matthias-kainer.de/blog/posts/so-whats-the-next-word-then-/
1•oesimania•38m ago•0 comments

Ed Zitron: The Hater's Guide to Microsoft

https://bsky.app/profile/edzitron.com/post/3me7ibeym2c2n
2•vintagedave•41m ago•1 comments

UK infants ill after drinking contaminated baby formula of Nestle and Danone

https://www.bbc.com/news/articles/c931rxnwn3lo
1•__natty__•42m ago•0 comments

Show HN: Android-based audio player for seniors – Homer Audio Player

https://homeraudioplayer.app
3•cinusek•42m ago•1 comments

Starter Template for Ory Kratos

https://github.com/Samuelk0nrad/docker-ory
1•samuel_0xK•44m ago•0 comments

LLMs are powerful, but enterprises are deterministic by nature

2•prateekdalal•47m ago•0 comments

Make your iPad 3 a touchscreen for your computer

https://github.com/lemonjesus/ipad-touch-screen
2•0y•53m ago•1 comments

Internationalization and Localization in the Age of Agents

https://myblog.ru/internationalization-and-localization-in-the-age-of-agents
1•xenator•53m ago•0 comments

Building a Custom Clawdbot Workflow to Automate Website Creation

https://seedance2api.org/
1•pekingzcc•55m ago•1 comments

Why the "Taiwan Dome" won't survive a Chinese attack

https://www.lowyinstitute.org/the-interpreter/why-taiwan-dome-won-t-survive-chinese-attack
2•ryan_j_naughton•56m ago•0 comments

Xkcd: Game AIs

https://xkcd.com/1002/
2•ravenical•57m ago•0 comments

Windows 11 is finally killing off legacy printer drivers in 2026

https://www.windowscentral.com/microsoft/windows-11/windows-11-finally-pulls-the-plug-on-legacy-p...
1•ValdikSS•58m ago•0 comments

From Offloading to Engagement (Study on Generative AI)

https://www.mdpi.com/2306-5729/10/11/172
1•boshomi•1h ago•1 comments
Open in hackernews

Building a password-based netcat that works without listening ports or known IPs

https://github.com/threatexpert/gonc
1•gonc•1mo ago

Comments

gonc•1mo ago
Hi HN,

I’ve been experimenting with a different take on netcat-style connectivity and wanted to share the design and trade-offs.

Traditional netcat-like tools assume one side listens on a reachable IP and port. This breaks down when both peers are behind NATs, firewalls, or dynamic networks. Often neither side knows the other’s IP or can expose an inbound port.

The goal is to enable an ad-hoc, netcat-like connection using only a shared secret, without requiring inbound connectivity.

Design goals:

A. Easy to use. No client/server role. Both peers run the same command, e.g. nc -p2p <passphrase>

B. Support nc -e style behavior for executing a program per connection

C. No listening port required

D. No prior knowledge of peer IP or domain

E. Works when both peers are behind NAT

F. Minimal setup and dependencies

G. Familiar stdin/stdout netcat-style usage

Core idea:

Both peers share a high-entropy passphrase. It is never transmitted, and is deterministically used to derive:

(1) A unique MQTT topic as a rendezvous channel (2) A TLS certificate and private key for mutual TLS identity verification

Connection flow:

(1) Each peer derives the MQTT topic and TLS identity from the shared passphrase

(2) Both peers independently establish outbound TCP connections to a public MQTT broker The broker cannot decrypt or interpret messages

(3) Each side performs local STUN probing to discover NAT-mapped addresses

(4) Candidate addresses are exchanged exclusively via the derived MQTT topic

(5) Peers first attempt direct TCP connections

(6) If TCP fails, peers automatically fall back to UDP hole punching As a last resort, a “birthday paradox” strategy is used: one side picks 600 random source ports, the other probes 600 random destination ports

(7) If direct P2P fails, an optional fallback uses an existing SOCKS5 UDP relay, without custom relay protocols

(8) Once a direct path is established, MQTT is no longer used; all traffic flows P2P over mutually authenticated TLS

At no point does either peer need to:

A. Listen on a fixed port

B. Expose or know the peer’s IP or domain

C. Trust the rendezvous infrastructure with plaintext identity or session data

The MQTT broker only observes opaque topic names and encrypted payloads. Without the passphrase, it cannot authenticate, impersonate, or correlate peers.

Security model:

The derived TLS certificate represents a deterministic peer identity, meaningful only to peers sharing the passphrase. Mutual TLS ensures peers cannot be impersonated even if candidate addresses are tampered with.

This is not intended to replace VPNs or general-purpose P2P frameworks. The goal is to explore how little coordination is needed to establish a direct, authenticated channel.

Usage example:

Think of this as a lightweight FRP-style alternative, without a public reverse-proxy or exposed ports.

To reach 10.0.0.1:22 inside a LAN, run on any host:

gonc -p2p <passphrase> -linkagent

Equivalent to:

gonc -p2p <passphrase> -e ":mux linkagent" -keep-open -mqtt-wait

Later, from home:

gonc -p2p <passphrase> -link 3080;3080

Both sides then get a local SOCKS5 proxy to access services on the peer LAN.

Implementation notes:

A. Written in Go

B. Single binary

C. Behaves like netcat (stdin/stdout piping)

D. MQTT is used only for rendezvous, never for data

I’m interested in feedback, especially around NAT edge cases, security assumptions, and alternative rendezvous mechanisms.