frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

GitHub Actions Has a Package Manager, and It Might Be the Worst

https://nesbitt.io/2025/12/06/github-actions-package-manager.html
91•robin_reala•2h ago•52 comments

12 Days of Shell

https://12days.cmdchallenge.com
5•zoidb•14m ago•1 comments

Turtletoy

https://turtletoy.net/
191•ustad•4d ago•29 comments

Jujutsu Worktrees Are Convenient

https://shaddy.dev/notes/jj-worktrees/
24•nvader•4d ago•6 comments

Damn Small Linux

https://www.damnsmalllinux.org/
102•grubbs•8h ago•27 comments

Emacs is my new window manager

https://www.howardism.org/Technical/Emacs/new-window-manager.html
86•gpi•2d ago•30 comments

I failed to recreate the 1996 Space Jam website with Claude

https://j0nah.com/i-failed-to-recreate-the-1996-space-jam-website-with-claude/
446•thecr0w•17h ago•366 comments

Bag of words, have mercy on us

https://www.experimental-history.com/p/bag-of-words-have-mercy-on-us
190•ntnbr•11h ago•192 comments

Show HN: Lockenv – Simple encrypted secrets storage for Git

https://github.com/illarion/lockenv
18•shoemann•2h ago•6 comments

The fuck off contact page

https://www.nicchan.me/blog/the-f-off-contact-page/
157•OuterVale•1h ago•61 comments

Show HN: ReadyKit – Superfast SaaS Starter with Multi-Tenant Workspaces

https://readykit.dev/
50•level09•1w ago•9 comments

Dollar-stores overcharge customers while promising low prices

https://www.theguardian.com/us-news/2025/dec/03/customers-pay-more-rising-dollar-store-costs
385•bookofjoe•19h ago•532 comments

Truemetrics (YC S23) Is Hiring

https://www.ycombinator.com/companies/truemetrics/jobs/1EHTSyT-python-software-engineer-analystic...
1•Jan-Truemetrics•3h ago

Google Titans architecture, helping AI have long-term memory

https://research.google/blog/titans-miras-helping-ai-have-long-term-memory/
501•Alifatisk•22h ago•164 comments

The C++ standard for the F-35 Fighter Jet [video]

https://www.youtube.com/watch?v=Gv4sDL9Ljww
269•AareyBaba•16h ago•296 comments

Mechanical power generation using Earth's ambient radiation

https://www.science.org/doi/10.1126/sciadv.adw6833
123•defrost•12h ago•40 comments

Einstein: NewtonOS running on other operating systems

https://github.com/pguyot/Einstein
8•fanf2•45m ago•0 comments

Solving Rush Hour, the Puzzle (2018)

https://www.michaelfogleman.com/rush/
29•xeonmc•1w ago•2 comments

Migrating Burningboard.net Mastodon Instance to a Multi-Jail FreeBSD Setup

https://blog.hofstede.it/migrating-burningboardnet-mastodon-instance-to-a-multi-jail-freebsd-setu...
12•todsacerdoti•1h ago•0 comments

An Interactive Guide to the Fourier Transform

https://betterexplained.com/articles/an-interactive-guide-to-the-fourier-transform/
204•pykello•6d ago•34 comments

I wasted years of my life in crypto

https://twitter.com/kenchangh/status/1994854381267947640
248•Anon84•21h ago•368 comments

'Extraordinary Discovery' at Orkney's Ness of Brodgar Neolithic Site

https://www.bbc.com/news/articles/c7836wvx4q4o
4•ohjeez•1w ago•0 comments

The Anatomy of a macOS App

https://eclecticlight.co/2025/12/04/the-anatomy-of-a-macos-app/
239•elashri•21h ago•73 comments

Uninitialized garbage on ia64 can be deadly (2004)

https://devblogs.microsoft.com/oldnewthing/20040119-00/?p=41003
73•HeliumHydride•3d ago•48 comments

CATL expects oceanic electric ships in 3 years

https://cleantechnica.com/2025/12/05/catl-expects-oceanic-electric-ships-in-3-years/
116•thelastgallon•1d ago•142 comments

How I block all online ads

https://troubled.engineer/posts/no-ads/
208•StrLght•12h ago•173 comments

Scala 3 slowed us down?

https://kmaliszewski9.github.io/scala/2025/12/07/scala3-slowdown.html
229•kmaliszewski•19h ago•132 comments

Palantir Could Be the Most Overvalued Company That Ever Existed

https://247wallst.com/investing/2025/11/25/palantir-could-be-the-most-overvalued-company-that-eve...
98•Anon84•5h ago•50 comments

Nested Learning: A new ML paradigm for continual learning

https://research.google/blog/introducing-nested-learning-a-new-ml-paradigm-for-continual-learning/
126•themgt•19h ago•4 comments

Applets Are Officially Gone, but Java in the Browser Is Better

https://frequal.com/java/AppletsGoneButJavaInTheBrowserBetterThanEver.html
44•pjmlp•2h ago•66 comments
Open in hackernews

Show HN: Lockenv – Simple encrypted secrets storage for Git

https://github.com/illarion/lockenv
18•shoemann•2h ago
Hi!

I got tired of setting up tools I can't explain to a team in a few words like sops or git-crypt, just to store few files with environment variables or secrets, so I built lockenv as a simple alternative.

It's basically a password-protected vault file you commit to git. No gpg keys, no cloud, just lockenv init, set a password, and lock/unlock the secrets.

This tool integrates with OS keyring, so you're not typing passwords constantly. Should work on Mac/Linux/Windows, but I tested it only on linux so far.

I am not trying to replace any mature / robust solution, just making small tool for simple cases, where I want to stop sharing secrets via slack.

Feel free to try, thank you!

Comments

rcarmo•1h ago
I use a Makefile target with GPG :)
jillesvangurp•48m ago
Sounds useful. We do similar things with encrypted properties files. Also, things like Ansible come with ansible vault. If you use Github, you can use Github secrets of course. And AWS/GCP/etc. tend to have secret stores.

The challenge with this solution is of course managing who has access and dealing with people leaving your team and no longer being trusted. Even if you still like them personally, just because they are outside your team would require you to change any credentials they might have.

In our case, our team is small and I simply ignore this problem. So, we have a keepass file with shared secrets and repositories with encrypted properties files and a master password in this keepass file. Mostly, it's just me handling the password. It also gets configured as a Github secret on repositories for CI and deployment jobs. It works. But I'm aware of the limitations.

This is an area where there are lots of tools but not a whole lot of standardized ones or good practices for using them. It's one of those things that acts as a magnet for enterprise complexity. Tools like this tend to become very unwieldy because of this. Which is why people keep reinventing them.

shoemann•43m ago
Absolutely agree. That is exactly why I made this tool - my projects usually don't have ansible, github, aws and other external dependencies, or have different sets of such dependencies, and teams are too small to use something enterprise level.
crote•22m ago
> The challenge with this solution is of course managing who has access and dealing with people leaving your team and no longer being trusted. Even if you still like them personally, just because they are outside your team would require you to change any credentials they might have.

At least it's a clearly exposed problem: everyone who has ever cloned the repo has a copy of your secrets.

With software like 1Password it is way too easy to blindly rely on built-in permission management. People implicitly assume that removing a person's 1Password access means they can no longer rely the underlying resource - but in practice they could've copied the secret onto a sticky note at any time, and it's not safe until you've rotated the secret!

With shared user accounts there's at least usually the possibility of using 2FA - but that's not exactly going to work with things like deployment tokens intended for automated use...

Of course in an ideal world we wouldn't have those kinds of secrets and we'd all be using short-lived tightly-scoped service accounts - but we don't live in an ideal world.

akabalanza•22m ago
That looks amazing, thanks for sharing!

I have a git-based sync tool for my dotenv files. Maybe I can store my ssh keys, too

Barathkanna•3m ago
Here’s a solid HN-style comment that’s positive but not blindly so, and gives real feedback:

⸻

This actually looks handy for the “small team with a couple of env files” use case. Most secret-management tools are great once you’re at scale, but trying to explain sops or git-crypt to a team that just wants to stop pasting secrets into Slack is… not fun. A simple password-protected vault committed to git is a reasonable middle ground.

I like the OS keyring integration too,removes a lot of friction. Curious how it behaves in multi-machine workflows and whether you plan to add any guardrails around accidental plaintext commits, since that’s usually where lightweight tools get tripped up.