<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: emurlin</title><link>https://news.ycombinator.com/user?id=emurlin</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 10:52:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=emurlin" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by emurlin in "Show HN: JavaScript Performance Benchmarking"]]></title><description><![CDATA[
<p>This is a browser-based JS benchmarking tool I've been working on for the past weeks, unsatisfied with the alternatives that are out there. The goal is / was supporting most features one would need (like NPM or JSR packages), setup and teardown code, seamless support for async code, etc. and at the same time present a report with not just raw speed (as most tools do) but with useful statistics.<p>The project is split into two parts, one which is this ready-to-use web UI (obviously, useful for testing in the browser), but also a minimal library that can orchestrate the tests and produce a report (with some nice CLI-based reporters too).</p>
]]></description><pubDate>Sat, 21 Mar 2026 16:48:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47468707</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=47468707</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47468707</guid></item><item><title><![CDATA[Show HN: JavaScript Performance Benchmarking]]></title><description><![CDATA[
<p>Article URL: <a href="https://benchmarkstudio.net/en/">https://benchmarkstudio.net/en/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47468398">https://news.ycombinator.com/item?id=47468398</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 21 Mar 2026 16:19:55 +0000</pubDate><link>https://benchmarkstudio.net/en/</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=47468398</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47468398</guid></item><item><title><![CDATA[New comment by emurlin in "Ask HN: What are you working on? (February 2026)"]]></title><description><![CDATA[
<p>In this case, it's based on a per-user secret key and AES-256, which with some careful key and IV-derivation, allows you to have a deterministic (and reversible) address for any given domain name. The basic principle (applied to ids, which extends to domain names) is in this blog post: <a href="https://apeleg.com/blog/posts/2023/03/30/enumeration-timing-uuids/#approach-taken" rel="nofollow">https://apeleg.com/blog/posts/2023/03/30/enumeration-timing-...</a><p>If you're willing / able to sacrifice reversibility, a more orthodox approach can be hash (or *MAC) based. For example, SHA-256(secret + domain-name). However, a key point of this project is attribution, to avoid the need of storing a large set of pre-generated addresses, for portability and for easy reverse aliases.<p>In terms of the actual SMTP bits, I'm currently relying on Cloudflare workers for receiving and delivering (just a nice and gratis API); however, extensibility within reason is a goal (in scope: provider-agnostic API; very probably not in scope: an SMTP client / server).</p>
]]></description><pubDate>Tue, 10 Feb 2026 05:20:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46955709</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=46955709</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46955709</guid></item><item><title><![CDATA[New comment by emurlin in "Ask HN: What are you working on? (February 2026)"]]></title><description><![CDATA[
<p>Most of my time goes to Group Income (<a href="https://groupincome.org" rel="nofollow">https://groupincome.org</a>) / Shelter (<a href="https://shelterprotocol.net" rel="nofollow">https://shelterprotocol.net</a>), a protocol and platform for building rich decentralised rich (web) applications with end-to-end-encryption. The idea is building the tech for an experience rivaling or surpassing that of siloed apps but with a focus on user and data autonomy.<p>The rest of my time goes into a few personal projects, most with no public URL yet.<p><pre><code>  * An IndieAuth provider based on WebAuthn, the idea being that instead of relying on delegating authentication, it could be handled directly using, e.g., U2F keys or a device.
  * A temporary e-mail address provider with deterministic addresses for attribution.
  * A self-service menu / ordering service
  * An E2EE document signing solution
</code></pre>
Some of these have led to a few mini-projects that I actively maintain due to not finding a fitting solution, such as:<p><pre><code>   * An HTTP media type negotiator (https://github.com/ApelegHQ/ts-http-media-type-negotiator) -- negotiate based on accept headers. This was because I couldn't find a negotiator that correctly parsed headers.
   * A JS sandbox (https://github.com/ApelegHQ/lot) -- Tried to implement something lightweight yet functional
   * A MIME multipart encoder and decoder (https://github.com/ApelegHQ/ts-multipart-parser) -- Attempt at a lightweight, general and spec-correct parser
   * A lightweight ASN.1 DER encoder (https://github.com/ApelegHQ/ts-asn1-der), meant to be used with its sister project (https://github.com/ApelegHQ/ts-cms-classes) --- Part of the document signing project
</code></pre>
In addition, trying to move a side-side project to Svelte 5:<p><pre><code>    * A web-based self-contained encryption/decryption tool (https://github.com/ApelegHQ/ts-cms-ep-sfx) --- Created to easily share files with maximum compatibility (ZIP archive inside a CMS payload) and minimum requirements.</code></pre></p>
]]></description><pubDate>Tue, 10 Feb 2026 00:12:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953537</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=46953537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953537</guid></item><item><title><![CDATA[New comment by emurlin in "Ask HN: Share your personal website"]]></title><description><![CDATA[
<p><a href="https://riv.ar" rel="nofollow">https://riv.ar</a><p>At the time, it's mostly just a web CV (with some effort put into implementing RDFa and microformats). The intent is adding a blog section too.</p>
]]></description><pubDate>Fri, 16 Jan 2026 14:42:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46646828</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=46646828</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46646828</guid></item><item><title><![CDATA[New comment by emurlin in "Ask HN: Freelancer? Seeking freelancer? (February 2025)"]]></title><description><![CDATA[
<p>SEEKING WORK | Norway | Remote | Contract (full-time or part-time)<p>Experienced software engineer specialising in backend development with a proven track record. Over ten years of industry experience, delivering exceptional results to drive projects forward.<p>What sets me apart:<p>- Broad expertise: Projects and technologies include data integration, Intel SGX, consensus protocols, REST APIs, and web development. Proficient in C, C++, CSS, Docker, ES6+, express.js, Java, JavaScript, Kotlin, LDAP, Linux, Neo4j, nginx, Node.js, PHP, PL/SQL, Postfix, React, TypeScript, Xen, and (X)HTML5, I possess a versatile skill set.<p>Why choose me:<p>- Strong problem-solving skills: Thrive on challenging problems, finding creative solutions. Excel in optimizing performance, designing scalable architectures and resolving complex technical issues.<p>Expertise in Identity and Access Management (IAM), security, and data integration. Deep understanding and practical experience to deliver secure and seamless solutions. Open to exploring new challenges and technologies beyond these areas.<p>Available for full-time, part-time, and consulting engagements. Let's connect and discuss how I can contribute to your success.<p>Location: Trøndelag, Norway<p>Remote: Yes (remote only, unless within Trøndelag or occasional meetups within Scandinavia)<p>Willing to relocate: No<p>Résumé/CV: <a href="https://riv.ar/curriculum-vitae/" rel="nofollow">https://riv.ar/curriculum-vitae/</a><p>Email: hn-u5cgNWJM（-ａｔ-）protonmail.com<p>GitHub: <a href="https://github.com/corrideat">https://github.com/corrideat</a>, <a href="https://github.com/ApelegHQ">https://github.com/ApelegHQ</a></p>
]]></description><pubDate>Tue, 04 Feb 2025 15:49:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=42933922</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=42933922</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42933922</guid></item><item><title><![CDATA[New comment by emurlin in "Ask HN: Who wants to be hired? (February 2025)"]]></title><description><![CDATA[
<p>SEEKING WORK | Norway | Remote | Contract (full-time or part-time)<p>Experienced software engineer specialising in backend development with a proven track record. Over ten years of industry experience, delivering exceptional results to drive projects forward.<p>What sets me apart:<p>- Broad expertise: Projects and technologies include data integration, Intel SGX, consensus protocols, REST APIs, and web development. Proficient in C, C++, CSS, Docker, ES6+, express.js, Java, JavaScript, Kotlin, LDAP, Linux, Neo4j, nginx, Node.js, PHP, PL/SQL, Postfix, React, TypeScript, Xen, and (X)HTML5, I possess a versatile skill set.<p>Why choose me:<p>- Strong problem-solving skills: Thrive on challenging problems, finding creative solutions. Excel in optimizing performance, designing scalable architectures and resolving complex technical issues.<p>Expertise in Identity and Access Management (IAM), security, and data integration. Deep understanding and practical experience to deliver secure and seamless solutions. Open to exploring new challenges and technologies beyond these areas.<p>Available for full-time, part-time, and consulting engagements. Let's connect and discuss how I can contribute to your success.<p>Location: Trøndelag, Norway<p>Remote: Yes (remote only, unless within Trøndelag or occasional meetups within Scandinavia)<p>Willing to relocate: No<p>Résumé/CV: <a href="https://riv.ar/curriculum-vitae/" rel="nofollow">https://riv.ar/curriculum-vitae/</a><p>Email: hn-u5cgNWJM（-ａｔ-）protonmail.com<p>GitHub: <a href="https://github.com/corrideat">https://github.com/corrideat</a>, <a href="https://github.com/ApelegHQ">https://github.com/ApelegHQ</a></p>
]]></description><pubDate>Tue, 04 Feb 2025 15:49:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=42933920</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=42933920</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42933920</guid></item><item><title><![CDATA[Becoming physically immune to brute-force attacks (2021)]]></title><description><![CDATA[
<p>Article URL: <a href="https://seirdy.one/posts/2021/01/12/password-strength/">https://seirdy.one/posts/2021/01/12/password-strength/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41940663">https://news.ycombinator.com/item?id=41940663</a></p>
<p>Points: 109</p>
<p># Comments: 68</p>
]]></description><pubDate>Thu, 24 Oct 2024 22:56:44 +0000</pubDate><link>https://seirdy.one/posts/2021/01/12/password-strength/</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=41940663</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41940663</guid></item><item><title><![CDATA[How to Convert a WordPress Blog to an Astro Static Site]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.okturtles.org/2024/10/convert-wordpress-to-static-site/">https://blog.okturtles.org/2024/10/convert-wordpress-to-static-site/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41838561">https://news.ycombinator.com/item?id=41838561</a></p>
<p>Points: 18</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 14 Oct 2024 15:40:38 +0000</pubDate><link>https://blog.okturtles.org/2024/10/convert-wordpress-to-static-site/</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=41838561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41838561</guid></item><item><title><![CDATA[New comment by emurlin in "Google now defaults to not indexing your content"]]></title><description><![CDATA[
<p><p><pre><code>  > Many valuable, high-quality pieces of content that people would find useful never make it into Google's index.
</code></pre>
I see your point in the light of the article (not indexed = not visible), but it feels like the things that _do_ make it need to follow very particular content and style patterns to rank high.<p>Anecdotally, this observation comes from searching for any term and seeing the results: they are usually similar-looking plausible-looking-but-actually-low-quality results that seem to follow the same or similar structure and have the same content. This does indeed limit the diversity and depth of information, but I'm not so sure it reduces spam, as these low-quality sites seem to be as prevalent as ever before, if not more.<p>From experience writing articles to a small tech blog, this means that it's quite difficult to get well-researched articles to rank well, even if they're indexed.<p>For example, I've written an article on how to block hotlinking (I've just checked, and Google says it's indexed). If you search for this, my article on a not-so-well-known blog is nowhere to be found(*)(**), and this is somewhat expected, for a myriad of reasons. The problem isn't that <i>my</i> post doesn't rank, but rather that none of the top-ranking (or even not-so-top-ranking) results are <i>wrong</i>. They are either about how to do this on cPanel or whatever, which is ineffective (but granted, could be what people are looking for), or instructions using the `Referer` header, which is ineffective.<p>These days, browsers offer headers like `Cross-Origin-Resource-Policy` which can completely solve the particular issue of hotlinking, unlike `Referer` which is easily bypassed using `referrerpolicy="no-referrer"`. However, because most 'authorities' seem to be wrong on this issue, the correct result isn't displayed, because it's a hard problem to solve algorithmically (or even manually).<p>(*) This doesn't affect <i>just</i> Google, though.<p>(**) Because it's indexed, adding the right keywords (which you wouldn't do in this case unless you already knew the answer) does bring it up, although from federated high-authority sites instead of the original canonical source.</p>
]]></description><pubDate>Tue, 16 Jul 2024 02:10:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=40973155</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=40973155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40973155</guid></item><item><title><![CDATA[New comment by emurlin in "Show HN: Execute JavaScript in a WebAssembly QuickJS sandbox"]]></title><description><![CDATA[
<p>Interesting approach! As an author of another JS sandbox library[1] that uses workers for isolation plus some JS environment sanitisation techniques, I think that interpreting JS (so, JS-in-JS, or as in this case, JS-in-WASM) gives you the highest level of isolation, and also doesn't directly expose you to bugs in the host JS virtual machine itself. Since you're targeting Node, this is perhaps even more important because (some newer developments notwithstanding) Node.js doesn't really seem to have been designed with isolation and sandboxing in mind (unlike, say, Deno).<p>From the API, I don't see if `createRuntime` allows you to define calls to the host environment (other than for `fetch`). This would be quite a useful feature, especially because you could use it to restrict communication with the outside world in a controlled way, without it being an all-or-nothing proposition.<p>Likewise, it doesn't seem to support the browser (at least, running a quick check with esm.sh). I think that that could be a useful feature too.<p>I'll run some tests as I'm curious what the overhead is in this case, but like I said, this sounds like a pretty solid approach.<p>[1] @exact-realty/lot</p>
]]></description><pubDate>Sun, 07 Jul 2024 14:37:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=40898029</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=40898029</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40898029</guid></item><item><title><![CDATA[Show HN: Cross-platform file encryption and sharing in the browser]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/Exact-Realty/ts-cms-ep-sfx">https://github.com/Exact-Realty/ts-cms-ep-sfx</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40681605">https://news.ycombinator.com/item?id=40681605</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 14 Jun 2024 15:09:25 +0000</pubDate><link>https://github.com/Exact-Realty/ts-cms-ep-sfx</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=40681605</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40681605</guid></item><item><title><![CDATA[Show HN: ECMAScript Sandbox [WIP]]]></title><description><![CDATA[
<p>This is what I've worked on a few months, isolate JS code using pure-JS techniques as well as platform available isolation (iframes, Workers, etc.) Would appreciate some comments and feedback.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38033318">https://news.ycombinator.com/item?id=38033318</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 27 Oct 2023 00:24:29 +0000</pubDate><link>https://github.com/Exact-Realty/lot</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=38033318</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38033318</guid></item><item><title><![CDATA[Generating Provenance Statements]]></title><description><![CDATA[
<p>Article URL: <a href="https://docs.npmjs.com/generating-provenance-statements/">https://docs.npmjs.com/generating-provenance-statements/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37786352">https://news.ycombinator.com/item?id=37786352</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 06 Oct 2023 01:46:14 +0000</pubDate><link>https://docs.npmjs.com/generating-provenance-statements/</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=37786352</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37786352</guid></item><item><title><![CDATA[New comment by emurlin in "mCaptcha: Open-source proof-of-work captcha for websites"]]></title><description><![CDATA[
<p>Exploring Proof of Work (PoW) as a substitute for CAPTCHAs is an interesting idea (PoW was originally conceived as a spam deterrent, after all), and one that I have considered (and use) in some web properties I manage. Not only does it obviate 'trusted' third parties, but it also has the potential to reduce the risk of accessibility issues often associated with traditional CAPTCHA. It also seems like a solution that scales nicely, as each 'proof' is made by the client and verification is cheap, <i>and</i> like a solution that finally ends the arms race against malicious traffic by bypassing the need to 'prove humanity'.<p>However, it's one of those solutions that look good on paper, but upon close inspection break down entirely or come with rather substantial tradeoffs. Ignore the environmental discussion about energy consumption for a moment, and let's face the reality that computational power is ridiculously inexpensive.<p>As a thought exercise, imagine you're trying to use PoW to ward off spammers (or the attack du jour), and you decide that a 1-cent expenditure on computation would be a sufficient deterrent. Let's say that renting a server costs $100/month (a bit on the higher end), or 0.004 cents per second.<p>So, if you wanted a PoW system that would cost the spammer 1 cent, you'd need to come up with a computational task that takes about 250 seconds, or over 4 minutes, to solve. That kind of latency just isn't practical in real-world applications. And that ignores that 1 cent is probably a ridiculously low price for protecting anything valuable.<p>Of course, you may consider this as an alternative to regular CAPTCHA services. A quick search gives me that this costs something like $3 for 1000 CAPTCHAs solved, or 0.3 cents per CAPTCHA. This changes the above calculation to about 1 minute of compute, which still seems rather unacceptable considering that you might, e.g., drain your users' battery.<p>So, overall, while I'd like for something like this to work, it probably only acts as a deterrent against attackers not running a full browser and who also aren't targeting you in particular.</p>
]]></description><pubDate>Tue, 08 Aug 2023 22:47:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056504</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=37056504</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056504</guid></item><item><title><![CDATA[New comment by emurlin in "Shelter Protocol: End-to-end encrypted, federated, user-friendly web apps"]]></title><description><![CDATA[
<p>Indeed, although undocumented, this is implemented and is a PAKE variant ([1] and [2]).<p>The way that it works, at a high level, is similar to how SRP works. Two random salts are generated (let's say, A and B), where A is used for authentication (and hence public) and B is used for deriving the other cryptographic keys.<p>When you authenticate, you retrieve A and then you prove to the server that you know what scrypt(A, password) is. At this point, the server provides you with B, and you can use this information to derive scrypt(B, password), which in turn you use to derive other cryptographic keys.<p>It being an oblivious password store, there are other steps taken to make the protocol stateless (from the perspective of the server) and to make parties commit to random values used so that runs of the protocol cannot be replayed.<p>> but the password database itself is still vulnerable to dictionary attacks once it’s stolen<p>This is correct, and I'm not sure there are good ways to prevent this or equivalent scenarios from occurring. Therefore, you should see this as an additional layer on top of your already secure password and not as a substitute for a secure password.<p>The reason for having this mechanism rather than not having it is to protect your password from brute-forcing by the public at large, in a scenario where the server operator is semi-trusted. Without this implementation, you have three alternatives: (1) Forego passwords entirely; (2) make the salted password 'public', along with the salt, which is all the information you need to brute-force it or (3) make more "normal" authentication flows without PAKE, in which case you need to trust the server even more. If you insist on using passwords, this is a compromise solution between (2) and (3), i.e., between anyone can break it and trust the server entirely.<p>[1] <<a href="https://github.com/okTurtles/group-income/blob/e2e-protocol/shared/zkpp.js">https://github.com/okTurtles/group-income/blob/e2e-protocol/...</a>><p>[2] <<a href="https://github.com/okTurtles/group-income/blob/e2e-protocol/backend/zkppSalt.js">https://github.com/okTurtles/group-income/blob/e2e-protocol/...</a>></p>
]]></description><pubDate>Fri, 21 Jul 2023 09:50:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=36811941</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=36811941</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36811941</guid></item><item><title><![CDATA[New comment by emurlin in "Shelter Protocol: End-to-end encrypted, federated, user-friendly web apps"]]></title><description><![CDATA[
<p>What do you mean by replacing trust with crypto? Like in 'code is law'? If so, yeah, you can't replace one thing with the other because they're fundamentally different things that may only overlap in certain areas.<p>But on a broader scale, I don't see what in cryptography makes power inherently more concentrated. Crypto is just a way for enforcing certain trust relations that have already been established or agreed upon. Just like you can use crypto to help centralise power (e.g., allowing you to only run signed applications that can only show signed content), you can use crypto to help decentralise power with tools for confidentially presenting content and allowing you to vet your applications haven't been tampered with.<p>In both cases the underlying technology has many common components, and what changes is the use you make of it.</p>
]]></description><pubDate>Thu, 20 Jul 2023 23:02:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=36807957</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=36807957</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36807957</guid></item><item><title><![CDATA[New comment by emurlin in "Shelter Protocol: End-to-end encrypted, federated, user-friendly web apps"]]></title><description><![CDATA[
<p>> you cant compute yourself out of a broken world.<p>Most certainly not, but surely you can build better tools with the aspiration of facilitating certain goals, can't you? It's not the tools in or by themselves that will improve (or worsen) the world, rather something at your disposal to pursue your goals.<p>> the myth that the computer will lead to a better, more equal society<p>Agreed that it won't. But, IMO, the strength of Shelter is that it covers a niche that many other systems (blockchain-y or otherwise) don't, which is data autonomy and confidentiality. Most popular web apps today are centralised silos that don't give you privacy from the operator, and those that aim for federation often also don't give you much privacy either.<p>Now, it can be that those factors are not important for the specific thing you're developing, and that's fine. But, if they are, having an existing framework to build on top of can give you a head start (even indirectly, by showing you what works or doesn't).<p>Disclaimer: I'm involved in the development of Shelter. All opinions are my own.</p>
]]></description><pubDate>Thu, 20 Jul 2023 22:40:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=36807742</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=36807742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36807742</guid></item><item><title><![CDATA[Privacy Pass: Captcha Mitigation and User Privacy]]></title><description><![CDATA[
<p>Article URL: <a href="https://exact.realty/blog/posts/2023/06/09/privacypass/">https://exact.realty/blog/posts/2023/06/09/privacypass/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=36257739">https://news.ycombinator.com/item?id=36257739</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 09 Jun 2023 13:46:06 +0000</pubDate><link>https://exact.realty/blog/posts/2023/06/09/privacypass/</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=36257739</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36257739</guid></item><item><title><![CDATA[Show HN: ECMAScript Sandbox]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/Exact-Realty/ecmascript-sandbox">https://github.com/Exact-Realty/ecmascript-sandbox</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=35895480">https://news.ycombinator.com/item?id=35895480</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 11 May 2023 00:16:22 +0000</pubDate><link>https://github.com/Exact-Realty/ecmascript-sandbox</link><dc:creator>emurlin</dc:creator><comments>https://news.ycombinator.com/item?id=35895480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35895480</guid></item></channel></rss>