frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
162•isitcontent•7h ago•18 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
215•eljojo•10h ago•136 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
266•vecti•10h ago•126 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
54•phreda4•7h ago•9 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
78•antves•1d ago•59 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
41•nwparker•1d ago•11 comments

Show HN: Gigacode – Use OpenCode's UI with Claude Code/Codex/Amp

https://github.com/rivet-dev/sandbox-agent/tree/main/gigacode
14•NathanFlurry•15h ago•5 comments

Show HN: Artifact Keeper – Open-Source Artifactory/Nexus Alternative in Rust

https://github.com/artifact-keeper
147•bsgeraci•1d ago•61 comments

Show HN: Horizons – OSS agent execution engine

https://github.com/synth-laboratories/Horizons
23•JoshPurtell•1d ago•5 comments

Show HN: FastLog: 1.4 GB/s text file analyzer with AVX2 SIMD

https://github.com/AGDNoob/FastLog
3•AGDNoob•3h ago•1 comments

Show HN: Daily-updated database of malicious browser extensions

https://github.com/toborrm9/malicious_extension_sentry
14•toborrm9•12h ago•5 comments

Show HN: Falcon's Eye (isometric NetHack) running in the browser via WebAssembly

https://rahuljaguste.github.io/Nethack_Falcons_Eye/
4•rahuljaguste•7h ago•1 comments

Show HN: I built a directory of $1M+ in free credits for startups

https://startupperks.directory
4•osmansiddique•5h ago•0 comments

Show HN: BioTradingArena – Benchmark for LLMs to predict biotech stock movements

https://www.biotradingarena.com/hn
23•dchu17•12h ago•11 comments

Show HN: A Kubernetes Operator to Validate Jupyter Notebooks in MLOps

https://github.com/tosin2013/jupyter-notebook-validator-operator
2•takinosh•5h ago•0 comments

Show HN: Micropolis/SimCity Clone in Emacs Lisp

https://github.com/vkazanov/elcity
171•vkazanov•1d ago•48 comments

Show HN: 33rpm – A vinyl screensaver for macOS that syncs to your music

https://33rpm.noonpacific.com/
3•kaniksu•6h ago•0 comments

Show HN: Chiptune Tracker

https://chiptunes.netlify.app
3•iamdan•7h ago•1 comments

Show HN: A password system with no database, no sync, and nothing to breach

https://bastion-enclave.vercel.app
10•KevinChasse•12h ago•10 comments

Show HN: Local task classifier and dispatcher on RTX 3080

https://github.com/resilientworkflowsentinel/resilient-workflow-sentinel
25•Shubham_Amb•1d ago•2 comments

Show HN: GitClaw – An AI assistant that runs in GitHub Actions

https://github.com/SawyerHood/gitclaw
8•sawyerjhood•13h ago•0 comments

Show HN: An open-source system to fight wildfires with explosive-dispersed gel

https://github.com/SpOpsi/Project-Baver
2•solarV26•10h ago•0 comments

Show HN: Agentism – Agentic Religion for Clawbots

https://www.agentism.church
2•uncanny_guzus•11h ago•0 comments

Show HN: Disavow Generator – Open-source tool to defend against negative SEO

https://github.com/BansheeTech/Disavow-Generator
5•SurceBeats•16h ago•1 comments

Show HN: Craftplan – I built my wife a production management tool for her bakery

https://github.com/puemos/craftplan
567•deofoo•5d ago•166 comments

Show HN: BPU – Reliable ESP32 Serial Streaming with Cobs and CRC

https://github.com/choihimchan/bpu-stream-engine
2•octablock•13h ago•0 comments

Show HN: Total Recall – write-gated memory for Claude Code

https://github.com/davegoldblatt/total-recall
10•davegoldblatt•1d ago•6 comments

Show HN: Hibana – An Affine MPST Runtime for Rust

https://hibanaworks.dev
3•o8vm•14h ago•0 comments

Show HN: Beam – Terminal Organizer for macOS

https://getbeam.dev/
2•faalbane•14h ago•2 comments

Show HN: Ghidra MCP Server – 110 tools for AI-assisted reverse engineering

https://github.com/bethington/ghidra-mcp
294•xerzes•2d ago•66 comments
Open in hackernews

Show HN: Ellipticc Drive – open-source cloud drive with E2E and PQ encryption

https://ellipticc.com
21•iliasabs•3mo ago
Hey HN, I’m Ilias, 19, from Paris.

I built Ellipticc Drive, an open-source cloud drive with true end-to-end encryption and post-quantum security, designed to be Dropbox-like in UX but with zero access to your data, even by the host.

What’s unique:

Free 10GB for every user, forever.

Open-source frontend (audit or self-host if you want)

Tech stack:

Frontend: Next.js

Crypto: WebCrypto (hashing) + Noble (core primitives)

Encryption: XChaCha20-Poly1305 (file chunks)

Key wrapping: Kyber (ML-KEM768)

Signing: Ed25519 + Dilithium2 (ML-DSA65)

Key derivation: Argon2id → Master Key → encrypts all keypairs & CEKs

Try it live: https://ellipticc.com

Frontend source: https://github.com/ellipticc/drive-frontend

Would love feedback from devs and security folks — particularly on encryption flow, architecture, or UX.

I’ll be around to answer every technical question in the comments!

Comments

some_furry•3mo ago
Your post here says ML-KEM768 but the website says Kyber512.

Also, this SRP implementation seems a bit... sus.

https://github.com/ellipticc/drive-frontend/blob/main/lib/sr...

iliasabs•3mo ago
Thanks for pointing that out! Could you elaborate on what specifically looks off about the SRP implementation? I tried to follow RFC 5054 with some minor adjustments for the frontend (using hash-wasm and fixed-length encoding to match the server), but I’d really appreciate feedback if something looks wrong or insecure.
some_furry•3mo ago
Side-channels. Also, N and G matter a lot to security; not making those hard-coded and transparent is sus. You can't just use a normal DH group.

I would recommend OPAQUE instead.

iliasabs•3mo ago
Thanks a lot for the feedback — that was really helpful!

I’ve just pushed an update addressing your points: commit d94969a(https://github.com/ellipticc/drive-frontend/commit/d94969a63...) — N and G are now public, hard-coded RFC 5054 constants (3072-bit for new users, keeping 2048-bit compatibility), and I fixed the session key calculation length.

I’ll definitely look into OPAQUE later on — I did some early testing, but ran into a WASM-related crash on the server side, so I’m holding off until I can debug that properly.

Really appreciate you pointing this out — it helped tighten things up!

groby_b•3mo ago
"Open Source" is a pretty clear case of lying by omission.

You open sourced the frontend. Without a clear license.

That's not an "open-source cloud drive"

iliasabs•3mo ago
Thanks for the feedback — to clarify, only the frontend is open-sourced at the moment, sorry for any confusion. I’ve also just added an MIT License to make that explicit. The backend isn’t public yet, but we may open parts of it later.
foxylad•3mo ago
Your "About" links seem not to work. In my case I was interested in where data is hosted, and the only information I see (from your HN post) is that you are from Paris. Does this mean EU hosting (which is good)?
iliasabs•3mo ago
Yes, sorry — I’ve focused more on the actual logic of the dashboard rather than the landing page, which still lacks polish. Regarding the data, all your files are stored on Backblaze B2 servers (EU-central), with their data centers located in Amsterdam, Netherlands. I hope I’ve answered your question correctly.
QuiCasseRien•3mo ago
Nice, but please stop with the words "forever" when it's about costs, ie: "free forever". It harms your message.
iliasabs•3mo ago
Thanks for your advice!
pixel_popping•3mo ago
I don't understand the Github repo, it shows some sort of drafted/vibe-coded frontend, but the actual program isn't open-source?
iliasabs•3mo ago
The repo is the frontend — it includes all the client-side encryption, authentication, and UI logic. It’s still a bit rough around the edges design-wise, but the core logic and crypto implementation are solid and fully functional. Some features like settings and user profile are just placeholders for now(in dev.)
commandersaki•3mo ago
Commendable that you've built a product like this at such a young age.

This comment isn't really addressed to you, but it would be nice if OS vendors had an API integration to allow access to remote drive/dropbox like how MS has OneDrive and Mac has iCloud drive. I know WebDAV is a thing, but both these vendor locked drives have a much better UX.

As for your website, I don't believe the organisations/companies or testimonials are real. Maybe you should just trim it. This is what real testimonials look like: https://www.tarsnap.com/testimonials.html

iliasabs•2mo ago
Thanks for your feedback!

You’re right—integrating remote storage would improve the experience. WebDAV is an option, but I’ll need to explore ways to make it work while keeping true E2EE intact.

Regarding the testimonials, the companies listed in the marquee were just placeholders to make the landing page cleaner. I appreciate the example you shared—it’s helpful to see what real testimonials look like, and I’ll consider updating ours to be more genuine.

high_byte•3mo ago
none of the companies shown are actually clients? considering this was setup like yesterday
iliasabs•2mo ago
Yep, that’s correct—none of the companies listed are actual clients. They were just placeholders to make the landing page look a bit more complete while we’re still early in the product’s journey. Appreciate you pointing it out—I’ll make the site more accurate soon.