<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ComputerGuru</title><link>https://news.ycombinator.com/user?id=ComputerGuru</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 11:45:55 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ComputerGuru" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ComputerGuru in "Show HN: Keeper – embedded secret store for Go (help me break it)"]]></title><description><![CDATA[
<p>SecureStore is an open spec/protocol for managing secrets in a secure and portable manner, while it defines the decryption key formats (currently: key-based, password-based, or a mix of both interchangeably) it doesn't get into the mechanics of key management, which are "trivial and left as an exercise for the reader."<p>More seriously though, you're supposed to use separate vaults (with the same keys, where "keys" is the name of the secrets, not the decryption keys) for testing/staging/production, e.g. perhaps secrets.{testing,production,staging}.json and the same secrets.{testing,production,staging}.key for the decryption keys, and store both the username and password in them (after all, it's just an encrypted, glorified KV store) so that you don't have to hard-code any usernames and conditionally load them based on the environment in your code (so db:username is one "secret" and db:password is another (actual) secret).<p>The secrets vaults (the secrets.json files) are non-sensitive and can be versioned and pushed to your server the same way you push the binaries. Now how you move the secrets to the server is up to you. You could do it the old-fashioned way and just have it as an environment variable, in which case even when your env vars leak at least you haven't leaked your api keys, only the key to decrypt them (which you'd then rotate), but that's not a recommended option. Ideally you'd instead use whatever secure channel you use to init/stage the servers to begin with to transfer the secure key files - the key files are generally immutable, even as the secrets change, so you only have to do this once (ideally via a high-friction, high-auth mechanism, for most people not at FAANG scale, probably manually).<p>You can also use whatever additional layer of abstraction on top of the symmetric SecureStore decryption key you like. For example, you could asymmetrically encrypt the keyfiles and then each host would decrypt it with its own private key, or have a secrets side channel that's just used to obtain the static decryption key over the local network, or use your operating system's encryption facilities to transmit it, whatever works for you at whatever point on the complexity/security curve you desire.<p>(These are all just options, none are official recommendations.)</p>
]]></description><pubDate>Fri, 10 Apr 2026 20:04:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47722994</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47722994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47722994</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Show HN: Keeper – embedded secret store for Go (help me break it)"]]></title><description><![CDATA[
<p>We actually just ported SecureStore to go, it’s sort of like this but with cross platform clis and intended to also allow sharing secrets across services and languages, in a secure and embedded fashion! It’s available in rust, php, .net, JS/TS, Python, and golang and easy to port to others.<p>I didn’t get a chance to do a write up but the golang port is here: <a href="https://github.com/neosmart/securestore-go" rel="nofollow">https://github.com/neosmart/securestore-go</a><p>The approach to crypto is very different, we went with what’s very well understood and very well supported on all platforms with little or no dependencies (eg we can use web crypto in JS frontend or backend with no external libs or crypto JS library nonsense).<p>The original .NET and Rust code is from over a decade ago and carefully architected (well before vibecoding was a thing), the secrets are stored in a human readable (json) vault that can be embedded in your binaries or distributed alongside them and be decrypted with either password-based or key-based decryption (or both).<p>The rust repo has the most info: <a href="https://github.com/neosmart/securestore-rs" rel="nofollow">https://github.com/neosmart/securestore-rs</a></p>
]]></description><pubDate>Fri, 10 Apr 2026 14:37:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47718833</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47718833</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47718833</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Microsoft terminated the account VeraCrypt used to sign Windows drivers"]]></title><description><![CDATA[
<p>For comparison, my code signing cert via Azure (no Microsoft store account required, can be used to self-publish binaries/installers the old fashion way) is $10/month, or about a third of the price Sectigo is charging you. I figured it was worth trying this route first, though I had to write my own basic tooling around it.</p>
]]></description><pubDate>Thu, 09 Apr 2026 15:54:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47705317</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47705317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47705317</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Veracrypt project update"]]></title><description><![CDATA[
<p>Thanks for sharing your experience. I have been code signing releases for over a decade as an indie publisher myself, until I found myself effectively iced out by the HSM requirement, the increased cost, and the shortened cert lifetimes, which, as someone with certain executive order dysfunctions, I already had a hard time being on top of with the old (multi-year) lifetimes.<p>I just migrated to MS artifact signing and, thank the lord, had an actually easier time getting verified than I did with the Sectigo and Comodo in the past. I’m sure I’m not representative of anyone else’s experience but having already had a developer account (with a different email and without an Azure account!) that I had already been using for the Microsoft Store might have helped, as well as the fact that I had a well-established business history (I’ve heard businesses younger than 3 years can’t get verified??), but reading all the comments here makes me very uneasy about the future.<p>It’s good to know the HSM route isn’t a complete non-starter. The main reason I panned it is that when I started looking into this I found that a number of companies that had previously offered the HSM route had done a bait and switch and were now keeping custody unless you were big enterprise (meaning willing to put up with 10k/yr fees). I did find a few that would allow OSS devs to sign their work, but read horror stories on Reddit and elsewhere about their freezing the account and issuing no refunds if you ask them to issue the cert in the name of your LLC or corporation instead of with your personal name (which I expressly did not want). Also, they actually were more expensive than Azure artifact signing even after the HSM cost was taken out.</p>
]]></description><pubDate>Wed, 08 Apr 2026 19:36:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47695190</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47695190</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47695190</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Muse Spark: Scaling Towards Personal Superintelligence"]]></title><description><![CDATA[
<p>So does this confirm the end of llama?</p>
]]></description><pubDate>Wed, 08 Apr 2026 16:54:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47692870</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47692870</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47692870</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Veracrypt project update"]]></title><description><![CDATA[
<p>It’s become neigh impossible to get your own code signing cert these days. The 2025 update from the CA forum required code signing certs to be short lived (no more three or five year certs) and stored exclusively on an HSM. As a result, most companies cross-signing these certs have moved to a subscription PaaS model where you are issued a cert but never receive custody of it, and perform signing via their APIs, and are at their mercy should they decide to block your account.<p>Anyway, even if you could get your own cert it would be same thing: MS could revoke or blacklist your indicate cert (though usually the grounds for doing so are much less shaky than your account being suspended for vague “tos violations”)</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:31:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691606</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47691606</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691606</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Veracrypt project update"]]></title><description><![CDATA[
<p>That’s not how any of this works. There are separate teams within (each division of) Microsoft that could easily pull the plug on your account (or if not the entire account then your account’s access to the specific service or family of services) for any of a myriad purported reasons or alleged ToS violations.<p>No one is calling an executive meeting to discuss banning an OSS dev’s account.</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:06:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691263</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47691263</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691263</guid></item><item><title><![CDATA[New comment by ComputerGuru in "AI helps add 10k more photos to OldNYC"]]></title><description><![CDATA[
<p>Thanks for the clarification!</p>
]]></description><pubDate>Tue, 07 Apr 2026 20:24:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47680891</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47680891</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47680891</guid></item><item><title><![CDATA[New comment by ComputerGuru in "AI helps add 10k more photos to OldNYC"]]></title><description><![CDATA[
<p>I have mixed feelings about this. It's absolutely phenomenal that such a treasure trove was unlocked thanks to AI, but presenting the AI results are "definitive" (even with an "edit" or "report" feature that's applied equally to human-located and AI-located results) isn't really a win. The old dataset might have been incomplete, but where locations <i>were</i> determined, they were a result of a (probably neural/autistic/ocd) human contributor that had some measure of true confidence in the results. AI contributions are great, but imho they should <i>never</i> be allowed to freely mix with and dilute human contributions: the resulting dataset is permanently polluted.<p>Ideally they'd always carry an "AI-generated" flag (in the db and in the frontend) until manually reviewed (or never) by a human. If anything, this is actually in AI proponent's favor as it would let you periodically regenerate or cross-validate (a subset of) the AI contributions some years down the line when newer and better models are released!</p>
]]></description><pubDate>Tue, 07 Apr 2026 19:22:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47680121</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47680121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47680121</guid></item><item><title><![CDATA[New comment by ComputerGuru in "12k Tons of Dumped Orange Peel Grew into a Landscape Nobody Expected (2017)"]]></title><description><![CDATA[
<p>There's actually no guarantee that if the "experiment" were allowed to continue that the results would have been as great. If the biomass accumulated faster than it could be broken down, we might not have seen the same result.</p>
]]></description><pubDate>Tue, 07 Apr 2026 19:17:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47680035</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47680035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47680035</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Show HN: I successfully failed at one-shot-ing a video codec like h.264"]]></title><description><![CDATA[
<p>Nothing on @bushido (props for humbly admitting what happened) but AI has completely destroyed people’s ability to appreciate the effort and domain knowledge that goes into the design of just about any properly successful undertaking.</p>
]]></description><pubDate>Mon, 06 Apr 2026 20:03:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47666235</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47666235</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47666235</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Neovim TreeSitter plugin has been archived on GitHub"]]></title><description><![CDATA[
<p>I’m not sure what this means for the future of the project; I can’t find any information about its deprecation anywhere.</p>
]]></description><pubDate>Sat, 04 Apr 2026 16:55:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47640853</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47640853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47640853</guid></item><item><title><![CDATA[Neovim TreeSitter plugin has been archived on GitHub]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/nvim-treesitter/nvim-treesitter">https://github.com/nvim-treesitter/nvim-treesitter</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47640852">https://news.ycombinator.com/item?id=47640852</a></p>
<p>Points: 21</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 04 Apr 2026 16:55:53 +0000</pubDate><link>https://github.com/nvim-treesitter/nvim-treesitter</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47640852</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47640852</guid></item><item><title><![CDATA[New comment by ComputerGuru in "ICAO issued new power bank restriction on flight"]]></title><description><![CDATA[
<p>You’re both saying the same thing.</p>
]]></description><pubDate>Sun, 29 Mar 2026 01:36:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47559697</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47559697</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47559697</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Antimatter has been transported for the first time"]]></title><description><![CDATA[
<p>A very different problem then the one I proposed an answer to, no?</p>
]]></description><pubDate>Wed, 25 Mar 2026 21:23:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47523460</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47523460</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47523460</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Apple randomly closes bug reports unless you "verify" the bug remains unfixed"]]></title><description><![CDATA[
<p>Every other month I get an email from a legacy pre-GH bug tracker that's either a "me too" or "bug fixed in latest release" <i>a decade</i> after I filed these one-offs you would be so quick to throw away. Bugs with no activity for years on end.</p>
]]></description><pubDate>Wed, 25 Mar 2026 20:35:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47522839</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47522839</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47522839</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Antimatter has been transported for the first time"]]></title><description><![CDATA[
<p>You can carry exactly (or roughly) as much energy in the form of antimatter as you would energy in the form of fuel.</p>
]]></description><pubDate>Wed, 25 Mar 2026 18:00:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47520977</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47520977</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47520977</guid></item><item><title><![CDATA[New comment by ComputerGuru in "Grafeo – A fast, lean, embeddable graph database built in Rust"]]></title><description><![CDATA[
<p>I think "written by genAI" should be a bigger turnoff than "written in Rust".</p>
]]></description><pubDate>Sat, 21 Mar 2026 18:17:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47469695</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47469695</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47469695</guid></item><item><title><![CDATA[New comment by ComputerGuru in "SSH has no Host header"]]></title><description><![CDATA[
<p>Plenty of (cattle or pet) tooling essentially devolves to SSH under those layers of abstraction.</p>
]]></description><pubDate>Wed, 18 Mar 2026 14:36:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47426348</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47426348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47426348</guid></item><item><title><![CDATA[New comment by ComputerGuru in "SSH has no Host header"]]></title><description><![CDATA[
<p>SRV is essentially a simple layer of abstraction that provides (via one approach) the required end result (reachability + UX) that is easy to add to any $PROTO client without. Supporting ESNI would complicate the actual lib/protocol, increase the amount of dev and maintenance work required all around, significantly increase complexity, and require more infrastructure and invasive integration than any DNS-enabled service already uses.</p>
]]></description><pubDate>Wed, 18 Mar 2026 14:34:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47426318</link><dc:creator>ComputerGuru</dc:creator><comments>https://news.ycombinator.com/item?id=47426318</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47426318</guid></item></channel></rss>