frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Wireguard FPGA

https://github.com/chili-chips-ba/wireguard-fpga
193•hasheddan•3h ago•48 comments

Completing a BASIC language interpreter in 2025

https://nanochess.org/ecs_basic_2.html
27•nanochess•1h ago•1 comments

Emacs agent-shell (powered by ACP)

https://xenodium.com/introducing-agent-shell
4•Karrot_Kream•7m ago•0 comments

Macro Splats 2025

https://danybittel.ch/macro.html
322•danybittel•10h ago•50 comments

Tiny Teams Playbook

https://www.latent.space/p/tiny
14•tilt•4d ago•1 comments

Rcyl – a recycled plastic urban bike

https://rcyl.bike/en/the-bike/
8•smartmic•1h ago•3 comments

Addictive-like behavioural traits in pet dogs with extreme motivation for toys

https://www.nature.com/articles/s41598-025-18636-0
115•wallflower•4h ago•70 comments

AdapTive-LeArning Speculator System (ATLAS): Faster LLM inference

https://www.together.ai/blog/adaptive-learning-speculator-system-atlas
182•alecco•12h ago•43 comments

HP1345A (and wargames) (2017)

https://phk.freebsd.dk/hacks/Wargames/
14•rbanffy•1h ago•0 comments

Germany's Schleswig-Holstein Completes Migration to Open Source Email

https://news.itsfoss.com/schleswig-holstein-email-system-migration/
248•sebastian_z•5h ago•75 comments

Paying AIs to read my books

https://kk.org/thetechnium/paying-ais-to-read-my-books/
45•zdw•4d ago•21 comments

How I'm using Helix editor

https://rushter.com/blog/helix-editor/
146•f311a•4h ago•42 comments

Three ways formally verified code can go wrong in practice

https://buttondown.com/hillelwayne/archive/three-ways-formally-verified-code-can-go-wrong-in/
3•todsacerdoti•14h ago•0 comments

oavif: Faster target quality image compression

https://giannirosato.com/blog/post/oavif/
3•computerbuster•4h ago•0 comments

A years-long Turkish alphabet bug in the Kotlin compiler

https://sam-cooper.medium.com/the-country-that-broke-kotlin-84bdd0afb237
3•Bogdanp•3h ago•0 comments

A whirlwind introduction to dataflow graphs (2018)

https://fgiesen.wordpress.com/2018/03/05/a-whirlwind-introduction-to-dataflow-graphs/
5•shoo•23h ago•0 comments

After the AI boom: what might we be left with?

https://blog.robbowley.net/2025/10/12/after-the-ai-boom-what-might-we-be-left-with/
45•imasl42•1h ago•94 comments

Loko Scheme: bare metal optimizing Scheme compiler

https://scheme.fail/
137•dTal•5d ago•13 comments

The neurons that let us see what isn't there

https://arstechnica.com/science/2025/10/the-neurons-that-let-us-see-what-isnt-there/
14•rbanffy•5d ago•0 comments

I'd like to speak to the Bellcore ManaGeR

https://www.ninakalinina.com/notes/mgr/
5•Bogdanp•6h ago•3 comments

We will no longer be actively supporting KuzuDB

https://kuzudb.com
51•nrjames•3h ago•30 comments

Nostr and ATProto (2024)

https://shreyanjain.net/2024/07/05/nostr-and-atproto.html
107•sph•11h ago•51 comments

Show HN: I built a simple ambient sound app with no ads or subscriptions

https://ambisounds.app/
27•alpaca121•5h ago•10 comments

Ridley Scott's Prometheus and Alien: Covenant – Contemporary Horror of AI (2020)

https://www.ejumpcut.org/archive/jc58.2018/AlpertAlienPrequels/index.html
34•measurablefunc•3h ago•13 comments

Meta Superintelligence's surprising first paper

https://paddedinputs.substack.com/p/meta-superintelligences-surprising
383•skadamat•21h ago•215 comments

GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773)

https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/
94•kerng•3h ago•10 comments

No I don't want to turn on Windows Backup with One Drive

https://idiallo.com/byte-size/say-no-to-onedrive-backup
439•firefoxd•5h ago•334 comments

Konrad Zuse's Helix Tower [pdf]

https://www.iaarc.org/publications/fulltext/The_helix-tower_by_konrad_zuse_automated_con-_and_dec...
75•xg15•4d ago•5 comments

The Flummoxagon

https://n-e-r-v-o-u-s.com/blog/?p=9827
100•robinhouston•5d ago•23 comments

C++ Reflection and Qt MOC

https://wiki.qt.io/C%2B%2B_reflection_(P2996)_and_moc
77•coffeeaddict1•3d ago•33 comments
Open in hackernews

Wireguard FPGA

https://github.com/chili-chips-ba/wireguard-fpga
192•hasheddan•3h ago

Comments

hnspammers•2h ago
I’ll need someone more into this to break it down for me - how does VPN work on this and why do you need an FPGA version of it? Is this an internal VPN or one for connecting to the internet?
turtletontine•2h ago
This part of the README answers the “why” pretty well:

> Both software and hardware implementations of Wireguard already exist. However, the software performance is far below the speed of wire.

> Existing hardware approaches are both prohibitively expensive and based on proprietary, closed-source IP blocks and tools.

> The intent of this project is to bridge these gaps with an FPGA open-source implementation of Wireguard, written in SystemVerilog HDL.

So having it on an FPGA gives you the best of both worlds, speed of a hardware implementation without the concerns of a proprietary black box.

kaoD•2h ago
Just a guess but I assume that this is (or rather, would be, judging by the README this isn't past the planning stage) for IoT and the like.

If you want your device to connect to a VPN you need something to implement the protocol. Cycles are precious in the embedded world so you don't want to do it in your microcontroller. You might offload it to another uC in your design but at that point it might make sense to just use an FPGA and have this at the hardware(-ish) level.

You can think of this as a "network interface chip" but speaking Wireguard instead of plain IP.

a-dub•2h ago
integration of some of the compute intensive bits into the nic itself. the reason to do it in hardware is to increase efficiency (or sometimes performance, although software/cpu wireguard is already pretty good). this could be baby steps towards lower power / miniaturized / efficient hardware that supports the wireguard protocol.

also just a fun project for the authors. :)

asimeqi•2h ago
Not a member of the project but here is my take:

You run the WireGuard app on your computer/phone, tap Connect, and it creates an encrypted tunnel to a small network box (the “FPGA gateway”) at your office or in the cloud. From then on, your apps behave as if you’re on the company network, even if you’re at home or traveling.

Why the FPGA box: Because software implementations are too slow and existing hardware implementations cost too much.

Internal or Internet: Both.

numpad0•2h ago
"VPN" is just virtual emulated network cables that you would use to connect your laptops to Wi-Fi routers. It's just so happens that a lot of companies use that word for a paid, cloud based Internet-over-Internet service. It's as if taxi companies called themselves "wheels" companies that whether you're referring to the physical object or the service had become ambiguous.

VPNs are normally processed in software, and that processing is usually multi-step. So latency, jitter, processing time per types of packets, etc can vary. This is FPGA based, and FPGA can run some algorithms and programs that can be implemented as chained conditions at fixed latency without relying on function calling in software. Presumably this is faster and more stable than software approaches thanks to that.

immibis•1h ago
Wireguard is a protocol and program for making point-to-point VPN connections. It's notable because it's simple (compared to alternatives like OpenVPN), so simple it became a kernel module which made it very fast. These guys implemented it in an FPGA because they could.
jauntywundrkind•2h ago
SpiralHDL is so cool. There's been so so much consolidation in the semiconductor market, and that's scary. But it feels like there's such an amazing base of new open design systems to work from now, that getting new things started should be so possible! There's just a little too much gap in actually getting the Silicon Foundry model back up, things all a bit too encumbered still. Fingers crossed that chip making has its next day.

> However, the Blackwire hardware platform is expensive and priced out of reach of most educational institutions. Its gateware is written in SpinalHDL, a nice and powerfull but a niche HDL, which has not taken roots in the industry. While Blackwire is now released to open-source, that decision came from their financial hardship -- It was originaly meant for sale.

Here's some kind of link for the old BlackWire 100Gbe wiregaurd project mentioned: https://github.com/FPGA-House-AG/BlackwireSpinal

bri3d•2h ago
Amusingly, after the commentaries about niche HDLs, the authors seem to have turned to PipelineC in this project.
IshKebab•2h ago
The problems with all not-SV HDLs are:

1. None of the commercial tools support them. All other HDLs compile to SV (or plain Verilog) and then you're wasting hours and hours debugging generated code. Not fun. Ask me how I know...

2. SV has an absolute mountain of features and other HDLs rarely come close. Especially when it comes to multi-clock designs (which are annoying and awkward but very common), and especially verification.

The only glimpse of hope I see on the horizon is Veryl, which hews close enough to SV that interop is going to be easy and the generated code is going to be very readable. Plus it's made by very experienced people. It's kind of the Typescript of SystemVerilog.

danhor•1h ago
What are the benefits of SV for multi-clock design? I found migen (and amaranth) to be much nicer for multi-clock designs, providing a stdlib for CDCs and async FIFOs and keeping track of clock domains seperately from normal signals.

My issue with systemverilog is the multitude of implementation with widely varying degrees of support and little open source. Xsim poorly supports more advanced constructs and crashes with them, leaving you to figure out which part causes issues. Vivado only supports a subset. Toolchains for smaller FPGAs (lattice, chinese, ...) are much worse. The older Modelsim versions I used were also not great. You really have to figure out the basic common subset of all the tools and for synthesis, that basically leaves interfaces and logic . Interfaces are better than verilog, but much worse than equivalents in these neo-HDLs(?).

While tracing back compiled verilog is annoying, you are also only using one implementation of the HDL, without needing to battle multiple buggy, poorly documented implementation. There is only one, usually less buggy, poorly documented implementation.

mlhpdx•2h ago
I haven’t tinkered with an FPGA in years but this has my curiosity up. I’d love to separate the protocol handling from the routing and see how light (small of an FPGA, power efficiency) it could be made.

The routing isn’t interesting to me - but protecting low power IoT traffic certain is.

nocman•2h ago
"With traditional solutions (such as OpenVPN / IPSec) starting to run out of steam" -- and then zero explanation or evidence of how that is true.

I can see an argument for IPSec. I haven't used that for many years. However, I see zero evidence that OpenVPN is "running out of steam" in any way shape or form.

I would be interested to know the reasoning behind this. Hopefully the sentiment isn't "this is over five years old so something newer must automatically be better". Pardon me if I am being too cynical, but I've just seen way too much of that recently.

vlovich123•1h ago
Seems like you just haven’t been paying attention. Even commercial VPNs like PIA and others now use Wireguard instead of traditional VPN stacks. Tailscale and other companies in that space are starting to replace VPN stacks with Wireguard solutions.

The reasons are abundant, the main ones being performance is drastically better, security is easier to guarantee because the stack itself is smaller and simpler, and it’s significantly more configurable and easier to obtain the behavior you want.

_joel•1h ago
I use and advocate for wireguard but I don't see it's adoption in bigger orgs, at least the ones I've worked in. Appreciate this situation will change over time, but it'll be a long tail.
awakeasleep•1h ago
Yeah itll be running out of steam not only when regulators _understand_ wireguard, but when its the recommendation and orgs need to justify their old vpn solution
danudey•55m ago
If you use Kubernetes and Calico you can use Wireguard to transparently encrypt in-cluster traffic[1] (or across clusters if you have cluster mesh configured). I wonder if we'll see more "automatic SDN over Wireguard" stuff like this as time goes on and the technology gets more proven.

Problem is IIRC if you need FIPS compliance you can't use Wireguard, since it doesn't support the mandated FIPS ciphers or what-have-you.

[1]https://docs.tigera.io/calico/latest/network-policy/encrypt-...

_joel•25m ago
sure, but I mean "road warrior" client. Typical, average company VPN users. Ironocally getting a technology like wireguard in k8s is easier than replacing an established vendor/product that serves normal users.
vlovich123•23m ago
It’ll take a little bit of time. But for example Cloudflare’s Warp VPN also uses Wireguard under the hood.

So while corp environments may take a long time to switch for various reasons, it will happen eventually. But for stuff like this corp IT tends to be a lagging adopter, 10-20 years behind the curve.

IlikeKitties•1h ago
Wireguard is slowly eating the space alive and thats a good thing.

Here's a very educational comparison between Wireguard, OpenVPN and IPSec. It shows how easy wireguard is to manage compared to the other solutions and measures and explains the noticeable differences in speed: https://www.youtube.com/watch?v=LmaPT7_T87g

Very recommended!

IntoEquanimity•56m ago
Interestingly tried out just now on one of my devices and Wireguard VPN speed was 5x faster on same configuration to OpenVPN.
wmf•55m ago
I wouldn't say they're running out of steam (they never had any) but OpenVPN was always poorly designed and engineered and IPSec has poor interop because there are so many options.
jbverschoor•7m ago
Unfortunately (luckily?) I don’t have enough knees about IPsec, but usually things make a lot more sense once you actually know the exact architecture and rationale behind it
smcleod•27m ago
OpenVPN has both terrible configuration and performance compared to just about anything else. I've seen it really drop off to next to no usage both in companies and for personal use over the past few years as wireguard based solutions have replaced it.
mrb•1h ago
I can't think of a scenario where this is useful. They claim "Full-throttle, wire-speed hardware implementation of Wireguard VPN" but then go on implementing this on a board with a puny set of four 1 Gbps ports... The standard software implementation of Wireguard (Linux kernel) can already saturate Gbps links (wirespeed, check) and can even approach 10 Gbps on a mid-range CPU: https://news.ycombinator.com/item?id=42172082

If they had produced a platform with four 10 Gbps ports, then it would become interesting. But the whole hardware and bitstream would have to be redevelopped almost from scratch.

bri3d•1h ago
There’s a strong air of grantware to it. The notion that it could be end-to-end auditable from the RTL up is interesting, though, and generally Wireguard performance will tank with a large routing table and small MTUs like you might suffer on a VPN endpoint server while this project seems to target line speed even at the absolute worst case routing x packets scenario.
asimovDev•51m ago
what do you mean by grantware?
roywashere•40m ago
The project got a grant from NLnet. I think they do a great job, they gave grants to many nice projects (and also some projects that are going nowhere, but I guess that is all in the game). NLnet really deserves praise for what they are doing!! https://nlnet.nl/thema/NGI0CommonsFund.html
renewiltord•1h ago
Amusingly, a lot of people have always been convinced that doing 10 Gbps is impossible on VPN. I recall a two-year old post on /r/mikrotik where everyone was telling OP it was impossible with citations and sources of why but then it worked

https://old.reddit.com/r/mikrotik/comments/112mo4v/is_there_...

Hikikomori•55m ago
They're discussing mikrotik hardware specifically? Enterprise stuff or a powerful server can easily do it.
esseph•12m ago
It's highly going to depend on the hardware in use.
wmf•49m ago
IMO it would be cool if they added Wireguard to Corundum but it would be expensive enough that they wouldn't get any hobbyist cred.
brcmthrowaway•48m ago
If a PC can do 10Gbps, are there any cycles left for other stuff?
soneil•22m ago
bps are easy. packets per second is the crunch. Say you've got 64 bytes per packet, which would be a worst-case-scenario - you're down to 150Mpacket/sec. Sending one byte after another is the easy bit, the decisions are made per-packet.
bri3d•1h ago
This is conceptually interesting but seems quite a ways from a real end to end implementation - a bit of a smell of academic grantware that I hope can reach completion.

Fully available source from RTL up (although the license seems proprietary?) is very interesting from an audit standpoint, and 1G line speed performance, although easily achieved by any recent desktop hardware, is quite respectable in worst case scenarios (large routing table and small frames). The architecture makes sense (software managed handshakes configure a hardware packet pipeline). WireGuard really lacks acceleration in most contexts (newer Intel QAT supposedly can accelerate ChaCha20 but trying to figure out how one might actually make it work is truly mind bending), so it’s a pretty interesting place to do a hardware implementation.

louwrentius•1h ago
I think Wireguard is awesome and I use it exclusively.

That said, when traveling - on hotel wifi - for internet to work, TCP port 443 is always open, thus OpenVPN will always work if you run it on that port.

For Wireguard, there isn’t a reliable always-open UDP port. Port 123 or 53 could work sometimes, but it’s not as guaranteed.

For any other application though, Wireguard would be my first choice.

CaptainOfCoit•1h ago
> For Wireguard, there isn’t a reliable always-open UDP port. Port 123 or 53 could work sometimes, but it’s not as guaranteed.

Couldn't you pipe it through something like udp2raw in those few cases? Probably performance would be worse/terrible, but then you say it's on hotel network so those tend to be terrible anyways.

commandersaki•30m ago
Yep, I really want to dote on wireguard and have contributed a little bit to it in its early years, but I've always found dsvpn to work at any cafe/hotel/hospital/etc. where I roam (except Sydney Airport - fuck their hostile wifi).

[dsvpn]: https://github.com/jedisct1/dsvpn

exabrial•1h ago
Here's a dumb question, tangentially related, since they have a 10gig L2 switch mentioned... How come nobody (almost) makes L2 10gig switches? Ubiquiti has a 8port L2, that really seems to be it.
denotational•1h ago
Do you mean specifically as consumer products?

There are loads of 10GbE switches from Cisco/Juniper/Arista/et al.

comboy•1h ago
Mikrotik has quite a few, I've been happily using CRS306 and CRS312 for some years now.
Hikikomori•52m ago
Not counting Cisco, juniper etc? Can probably get 32port 10G on eBay for cheap. There's also some on Amazon and AliExpress. And tons of white label options.
hackmiester•36m ago
Do you mean like most vendors have moved onto faster port speeds? Mostly you can still use the slower 10G optics and the ports will clock down even if the nominal port speed is higher.
c0l0•1h ago
Very cool project - hoping to see follow-up designs that can do more than 1Gbps per port!

I recently built a fully Layer2-transparent 25Gbps+ capable wireguard-based solution for LR fiber links at work based on Debian with COTS Zen4 machines and a purpose-tailored Linux kernel build - I'd be curious to know what an optimized FPGA can do compared to that.

Hikikomori•1h ago
When macsec exists?
bc569a80a344f9c•43m ago
No kidding.

Just to elaborate for others, MACSec is a standard (802.1ae) and runs at line rate. Something like a Juniper PTX10008 can run it at 400Gbps, and it’s just a feature you turn on for the port you’d be using for the link you want to protect anyway (PTXs are routers/switches, not security devices).

If I need to provide encryption on a DCI, I’m at least somewhat likely to have gear that can just do this with vendor support instead of needing to slap together some Linux based solution.

Unless, I suppose, there’s various layer 2 domains you’re stitching together with multiple L2 hops and you don’t control the ones in the middle. In which case I’d just get a different link where that isn’t true.

soupbowl•45m ago
This is a very cool project! I had never heard of SystemVerilog until today.
altairprime•43m ago
Project page: https://nlnet.nl/project/KlusterLab-Wireguard/