frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Why is Claude an Electron app?

https://www.dbreunig.com/2026/02/21/why-is-claude-an-electron-app.html
284•dbreunig•3h ago•217 comments

EDuke32 – Duke Nukem 3D (Open-Source)

https://www.eduke32.com/
133•reconnecting•4h ago•51 comments

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://github.com/xaskasdf/ntransformer
67•xaskasdf•3h ago•17 comments

Evidence of the bouba-kiki effect in naïve baby chicks

https://www.science.org/doi/10.1126/science.adq7188
49•suddenlybananas•2h ago•12 comments

Parse, Don't Validate and Type-Driven Design in Rust

https://www.harudagondi.space/blog/parse-dont-validate-and-type-driven-design-in-rust/
109•todsacerdoti•4h ago•36 comments

I verified my LinkedIn identity. Here's what I handed over

https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/
1142•ColinWright•17h ago•405 comments

zclaw: personal AI assistant in under 888 KB, running on an ESP32

https://github.com/tnm/zclaw
78•tosh•11h ago•47 comments

How far back in time can you understand English?

https://www.deadlanguagesociety.com/p/how-far-back-in-time-understand-english
329•spzb•3d ago•197 comments

Happy Zelda's 40th first LLM running on N64 hardware (4MB RAM, 93MHz)

https://github.com/sophiaeagent-beep/n64llm-legend-of-Elya
21•AutoJanitor•2h ago•4 comments

Toyota Mirai hydrogen car depreciation: 65% value loss in a year

https://carbuzz.com/toyota-mirai-massive-depreciation-one-year/
83•iancmceachern•6h ago•202 comments

CXMT has been offering DDR4 chips at about half the prevailing market rate

https://www.koreaherald.com/article/10679206
143•phront•10h ago•109 comments

Who's liable when your AI agent burns down production?

https://reading.sh/whos-liable-when-your-ai-agent-burns-down-production-039193d82746?sk=4921ed2db...
4•zenoware•43m ago•1 comments

Canvas_ity: A tiny, single-header <canvas>-like 2D rasterizer for C++

https://github.com/a-e-k/canvas_ity
49•PaulHoule•5h ago•19 comments

Finding forall-exists Hyperbugs using Symbolic Execution

https://dl.acm.org/doi/full/10.1145/3689761
10•todsacerdoti•4d ago•0 comments

Claws are now a new layer on top of LLM agents

https://twitter.com/karpathy/status/2024987174077432126
166•Cyphase•23h ago•611 comments

What not to write on your security clearance form (1988)

https://milk.com/wall-o-shame/security_clearance.html
362•wizardforhire•7h ago•155 comments

Inputlag.science – Repository of knowledge about input lag in gaming

https://inputlag.science
55•akyuu•4h ago•10 comments

I Don't Like Magic

https://adactio.com/journal/22399
99•edent•3d ago•81 comments

Declarative, Inquisitive, then Imperative (2017) [pdf]

https://www.forth.org/svfig/kk/11-2017-Falvo.pdf
3•tosh•4d ago•0 comments

Acme Weather

https://acmeweather.com/blog/introducing-acme-weather
177•cryptoz•17h ago•113 comments

Personal Statement of a CIA Analyst

https://antipolygraph.org/statements/statement-038.shtml
132•grubbs•6h ago•74 comments

Permacomputing

https://wiki.xxiivv.com/site/permacomputing.html
81•tosh•4d ago•20 comments

Be wary of Bluesky

https://kevinak.se/blog/be-wary-of-bluesky
228•kevinak•1d ago•166 comments

Online Pebble Development

https://cloudpebble.repebble.com/
11•teekert•3h ago•6 comments

Cloudflare outage on February 20, 2026

https://blog.cloudflare.com/cloudflare-outage-february-20-2026/
145•nomaxx117•5h ago•97 comments

MeshTNC is a tool for turning consumer grade LoRa radios into KISS TNC compatib

https://github.com/datapartyjs/MeshTNC
19•todsacerdoti•4h ago•5 comments

Padlet (YC W13) Is Hiring in San Francisco and Singapore

https://padlet.jobs
1•coffeebite•12h ago

Uncovering insiders and alpha on Polymarket with AI

https://twitter.com/peterjliu/status/2024901585806225723
121•somerandomness•1d ago•117 comments

AI uBlock Blacklist

https://github.com/alvi-se/ai-ublock-blacklist
215•rdmuser•16h ago•94 comments

Show HN: Iron-Wolf – Wolfenstein 3D source port in Rust

https://github.com/Ragnaroek/iron-wolf
54•ragnaroekX•8h ago•19 comments
Open in hackernews

Password managers less secure than promised

https://ethz.ch/en/news-and-events/eth-news/news/2026/02/password-managers-less-secure-than-promised.html
52•mono-bob•3h ago

Comments

mjamil•1h ago
Has there been a similar evaluation of 1Password?
rorylawless•1h ago
1Password wrote a response to the paper: https://1password.com/blog/eth-zurich-zero-knowledge-malicio...
herczegzsolt•1h ago
I am bit disappointed they did not immediately jump on implementing the two straightforward recommendations:

> PROPOSED MITIGATION. A straightforward mitigation is to have the client sign vault keys using the RSA private key in the keyset before encrypting them with the RSA public key.

> PROPOSED MITIGATION. [...] it would be easy for 1Password to prevent it entirely: the secret key can be used (with proper key derivation) to authenticate the KDF parameters with a cryptographic MAC.

To be fair, these issues are not really impacting long-time users. I have hundreds if not thousands of items in my vaults, there's no way i'm not noticing if they dissappear (which would be a side effect of these attacks).

Overall, I think 1password can be proud of their architecture and product quality, but i'd love to see these improvements - and maybe something like a "signal verification code" for sharing?

tempay•1h ago
It seems like 1Password is significantly more secure given the ratio of its market share to the number of articles I’ve seen like this one.
kenniskrag•1h ago
> Much like the other products we analyse, 1Password lacks authentication of public keys. This trivially enables sharing attacks similar to BW09, LP07 and DL02, something that the 1Password whitepaper...

> IMPACT. Complete compromise of vault confidentiality and integrity. The adversary can read and decrypt all vault con- tents encrypted after the attack, including passwords, credit card information, secure notes, and other sensitive data stored in the vault. Similarly, they can inject new items into the vault after the attack. REQUIREMENTS. The client fetches key material from the server, for example due to the user logging in on a new device. If executed on a non-empty vault, the attack results in the client losing access to all items already in their vault, while leaking any new items added to the vault after the attack took place. If the attack is executed at the time of vault creation, the attack is effectively undetectable by the client, since it cannot distinguish between a ciphertext it created and the ciphertext created by the server during the attack. PROPOSED MITIGATION. A straightforward mitigation is to have the client sign vault keys using the RSA private key in the keyset before encrypting them with the RSA public key. Ideally, two different key pairs would be used for...

from the paper: https://eprint.iacr.org/2026/058.pdf

loeg•1h ago
See https://zkae.io/
baal80spam•1h ago
That's why KeePass is still the king. Offline vault > online vault.
LoganDark•1h ago
KeePassXC can even still be online, too; example: https://logandark.net/passwords.kdbx

It's not centralized, of course; you still have to download the entire database, and then potentially upload the entire database again for any changes; but it doesn't have these vulnerabilities.

wps•1h ago
Haha this was a powermove. It is genuinely great that since it’s just a file you can host it anywhere you want. S3, WebDAV, your own site. I personally use copyparty and WireGuard for my kdbx file. I find it better than syncthing because there’s an obvious master copy (edited in place), and there’s no good way to keep syncthing running all the time on iOS, which can lead to sync conflicts.
roughE•1h ago
Just how do you use copyparty and wireguard for this if you kindly elaborate on that please
dizhn•1h ago
I sometimes casually include tokens in my comments (changing a few characters here and there) to make people gasp but parent is taking it to a different level.
wps•1h ago
I mostly agree! However, I plan on posting an article on HN soon discussing some of the issues with the .kdbx file format that KeePass and derivatives use within the next couple of days. KeePass has such great potential, but falls short compared to some of its (local) competitors.
arunc•1h ago
Looking forward to
delichon•1h ago
Which local competitors do you recommend? Is a text file one of them?
wps•1h ago
I don’t recommend any of them. Some of them have critical metadata leakage issues (Pass and derivatives, which leak the number of accounts & their names) and most others are not open source—an immediate disqualification for a local password manager. KeePassXC is my choice on desktop. Keepassium on iOS.
spacebuffer•1h ago
What to do if my house catches on fire, including my computer where the passwords are stored?
judofyr•1h ago
It’s just an encrypted file on disk. You’d depend on whatever backup solution you already have in place.
wps•1h ago
Well, the same issue exists for your BitWarden recovery keys or 2fa method. You need to have proper and redundant off site backups for anything valuable.
fullstop•1h ago
Not exactly. I need to have those offsite, but they are not modified at the same frequency as passwords.
Telaneo•1h ago
How often do your change your passwords? Assuming they are decently long and all that, why would you change them at all other than when a site gets breached?

The only reason my Keepass database changes is because I make new accounts on sites every now and then, and that's a fairly rare thing these days. And if I get so ungodly unlucky that my house burns down before my off-site database is updated to have that new account listed, I'll still have access to the email that account is associated with, so I can still recover the account either way.

fullstop•1h ago
Every time I add an account, for one. And there's still plenty of (dumb) sites which force me to change my password and sometimes username periodically.

Keeping an offsite database in sync is tedious, especially if it's delivered via sneakernet.

Telaneo•1h ago
I add an account to that database maybe twice a year, probably less. Do you make a lot more accounts than that?

The off-site solution I have updates a lot more often than that, although that's only because only the really important stuff is backed up in that way; the stuff I truly need to survive my house burning down.

fullstop•1h ago
I take it that you don't have children?

I'm almost done with that aspect of my life now, but every school year it feels like there's a new slate of apps, parent communication portals, etc. I need to manage these as well.

It's way more often than twice a year for me. And it's accelerating.

Telaneo•58m ago
I don't, and now I have yet another reason not to.
wps•1h ago
Fair enough, but it’s genuinely super easy to have a regular copy of your password manager saved in the cloud. You can also have a less frequently updated version stored somewhere physical that isn’t your house. My house burning down has never been a concern for me, as I’ve taken the proper precautions for my data.
Telaneo•1h ago
Off-site backup.
eblume•1h ago
I recently orchestrated this, although in my case I've chosen to use 1password's cloud based store as my primary secret store, so I'm accepting some exposure right off the bat that you might not be comfortable with.

I've documented the recovery process here: https://docs.eblu.me/how-to/operations/restore-1password-bac...

Basically, I have a borg backup job which runs every day, in a 3-2-1 replication strategy with the backups being sent both to a locally encrypted NAS (backups themselves have an additional layer of encryption via borg) as well as off-site with BorgBase. Those backups scoop up an export of 1password that I have a reminder to kick off manually about once a month via this script: https://github.com/eblume/blumeops/blob/main/mise-tasks/op-b...

The password that decrypts the key (along with the password that decrypts the backup) is stored on a piece of paper in a fireproof safe in my house. I've got a reminder to practice the entire DR process every six months, although I've only done it once so far as this is all pretty new.

It was fun to build!

Krutonium•44m ago
Just a heads up, Fireproof Safes are not failure proof, you should have that key securely stored somewhere else as well.
eblume•35m ago
Thanks, it's also available via my 1password cloud account, so it'd have to be a joint fire at my home and the 1password data center (and my phone, for that matter). Pretty bad day I feel.

Unrelated note: this was the first time I've linked to my static generated docs for this project and it was really fun watching the grafana dash of my fly.io nginx proxy pick up all the scraping traffic. Thanks for warming my cache :) I work with this tech all the time at my day job but this is the first time I've hosted something from my home, it's genuinely made my afternoon to see it light up.

JamesLeonis•8m ago
I sync the database to my phone, and a couple of other devices too with syncthing. I need it on my phone anyway to log into accounts while I'm out and about.
Someone1234•1h ago
One of the things the article touches on is encouraging these vendors to migrate their customers to more secure/modern security standards. How is this handled with KeePass with it being, by its very nature, decoupled?
JamesLeonis•14m ago
Not the parent, but a heavy user of Keepass. When you unlock your database, you can re-key it with several options for encryption algorithm, key derivation, and the transform rounds. I also have it set up with my Yubikeys as a kinda-sorta two factor for an added layer of security.

To keep the encryption modern regular updates are made to the program, and any migration would happen when re-encrypting the database. Checking my earliest entry, I've used it for 15 years without a hiccup.

jmclnx•1h ago
>cloud-based password managers

The main issue with these managers. I use an encrypted text file and Emacs, nothing on the cloud for me.

setopt•1h ago
That doesn’t fit all use cases though. For example, how to fill passwords in mobile apps on the go, or how to share a subset of your passwords with your family (including syncing password changes with them).
doubled112•1h ago
I’m not sure why anybody is surprised. Eventually, everything is proven to be less secure than promised, especially once they are online.

There are certain types of data I prefer to have complete control over. Passwords, no matter how encrypted they claim to be, are top of the list.

Sytten•1h ago
We will see when the attacks are public, a lot of the malicious server attacks we have seen in the past were kinda of overblown. Not discounting OP but it is very easy to get into clickbait territory.
mberger•1h ago
Save you the click.

The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass and 6 on Dashlane

bstsb•1h ago
a better summary from the site:

> We examine the extent to which security against a fully malicious server holds true for three leading vendors who make the Zero Knowledge Encryption claim: Bitwarden, LastPass and Dashlane [...] The attacks range in severity, from integrity violations of targeted user vaults to the complete compromise of all the vaults associated with an organisation.

bstsb•1h ago
caveat not properly addressed in the blog post: all "attacks" are assuming full takeover of web servers, which is certainly a scenario that should be protected against, but isn't really a vulnerability unless chained with something else.

almost all online services would be "vulnerable" in this way - take almost any login system. an RCE on a system hosting a login page would obviously be vulnerable to account takeover

better link here (the technical details): https://zkae.io/

kenniskrag•1h ago
Not if the advertise zero knowledge encryption. As far as I understand the password sharing / collaboration feature is often the problem.

Second: The provider can get the passwords with a simple server change.

Someone1234•1h ago
I use Bitwarden, and I like them, but I still disagree.

One of the things Bitwarden's design is MEANT to offer is "zero knowledge" meaning that it is an AES-256 encrypted database "blob", with PBKDF2 derived master password.

So "compromised" server absolutely IS something the DESIGN should protect against. If compromising Bitwarden's servers lets them extract what they say they can extract, then the whole "zero knowledge" assurance is dead in the water.

Plus, Bitwarden themselves don't even need to be compromised, we could have a DNS redirect into a server the bad-guys (inc. national-state) control. Then leverage that into complete compromise of your database.

fullstop•1h ago
Does't TLS pinning alleviate the DNS attack?
drnick1•1h ago
> cloud-based password managers.

Enough said. This kind of stuff should be offline only. If you need to access your password database on multiple devices, set up a LAN and/or a Wireguard tunnel for remote access.

adamm255•1h ago
Hard agree, but Average Joes have no idea what any of those words mean let alone the means to do it.
Someone1234•1h ago
At least a KeePass file via Cloud Storage seems like a somewhat sane tradeoff between security and convenience.

What you're proposing where you're adding a backdoor to your home network (via Wireguard) that needs to be maintained/hardened, and then still needing a LAN hosting solution for the actual database running 24-hour, is neither convenient nor secure (least of all because of layer 1 / fire / theft).

This is a fragile solution which isn't solving any particular problem; but certainly introducing multiple new exciting potential problems.

lofaszvanitt•1h ago
What a sane idea to store all your secrets in one place.... for attackers to get ahold of them in one move.
wps•1h ago
Why does the federal reserve keep all that gold in one place? It’s far better to have a ridiculously secure store than it is to have to reuse passwords across a hundred sites (nobody here can remember a hundred unique high entropy passwords). I trust the cryptography far more than my brain to handle these things.
63•1h ago
The article is nearly useless for users of the software who want to know how their data may have been affected. The researchers' website is more descriptive, especilly wrt specific findings.

https://zkae.io/

loeg•1h ago
1Password comes out looking relatively good here.
fullstop•1h ago
Bitwarden's response [1] is interesting.

"All issues have been addressed by Bitwarden. Seven of which have been resolved or are in active remediation by the Bitwarden team. The remaining three issues have been accepted as intentional design decisions necessary for product functionality."

They don't expand on what those three are.

1. https://bitwarden.com/blog/security-through-transparency-eth...

hleszek•52m ago
you can see them in the report at the bottom, but I counted four. See my post above.
hleszek•53m ago
That's much better, thanks. According to the Bitwarden blog post: https://bitwarden.com/blog/security-through-transparency-eth... which contains its full cryptography report at the end, all the issues have been fixed except a few which are considered part of the design (see below), so if I understand correctly you have nothing to worry about if you don't use organizations and use a strong password.

Issue 5: Organisation Key Injection (Medium)

When users interact with organizations, a trust relationship is established through the exchange of cryptographic keys. A malicious server could add users to arbitrary organizations by encrypting an organization symmetric key under the user's public key and including it in sync responses. The client would silently accept the new organization membership. Alternatively, when a user creates an organization, the malicious server could substitute the newly created organization's keys with attacker-controlled keys during the post-creation sync.

Issue 7: Disable KDF Bruteforce Protection (Low)

Bitwarden uses Password-Based Key Derivation Functions (PBKDF2 or Argon2id) to derive the master key from the user's master password. The iteration count – currently defaulting to 600,000 for PBKDF2 – provides brute-force resistance. The researchers identified that KDF settings are stored on the server without authentication, allowing a malicious server to reduce the iteration count and receive a master key hash that is faster to brute-force.

Issue 9: Malleable Vault Format and Unencrypted Metadata (Low)

The researchers identified that while individual fields are encrypted, metadata about field positions and item structure is not integrity-protected, potentially allowing field reordering or item manipulation

Issue 10: Access Violation in Organisation Collections (Low)

Organization collections enable shared access to vault items among organization members. By design, the organization symmetric key is shared with all organization members, allowing them to access collection contents to which they have specifically been granted access