<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: lucasfin000</title><link>https://news.ycombinator.com/user?id=lucasfin000</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 20:35:15 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=lucasfin000" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by lucasfin000 in "Aster Mail – End-to-end encrypted email with post-quantum cryptography"]]></title><description><![CDATA[
<p>This is definitely a fair concern, and something that we have thought thoroughly about, but let me clarify some things:<p>Our architecture makes jurisdiction less relevant than it would be for a traditional email provider. All email content, subjects, attachments, contacts, etc are encrypted client-side, locally, before they reach our servers, and you hold the keys, not us.<p>If we ever were to receive a legal request, we could only hand over encrypted blobs and routing metadata (sender/recipient addresses, timestamps), the same metadata any email provider in any country would have.<p>We maintain a warrant canary at <a href="https://astermail.org/notices/canary.txt" rel="nofollow">https://astermail.org/notices/canary.txt</a>, and we have a full transparency report at <a href="https://astermail.org/transparency" rel="nofollow">https://astermail.org/transparency</a>. We have never received a secret government subpoena, national security letter, or a gag order to date.</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:34:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47877006</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47877006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47877006</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Aster Mail – End-to-end encrypted email with post-quantum cryptography"]]></title><description><![CDATA[
<p>Yes, we did see the thread shortly after it was posted, and we did move the restricted email address validation to the server side. The client-side check is still there in the UX layer, but it is no longer the security boundary. Thank you for bringing it up here.</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:28:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47876907</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47876907</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47876907</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Aster Mail – End-to-end encrypted email with post-quantum cryptography"]]></title><description><![CDATA[
<p>Hi HN. We have been building a quantum-safe, end-to-end encrypted email service where we, by design, cannot read your mail. Very few encrypted email services have post-quantum cryptography in production that works with any encrypted email provider, not just their own users. Client-side encryption with post-quantum cryptography, zero-access architecture, fully open source under AGPL v3, our servers are located in Germany. We have officially released, and you can create your account at: <a href="https://astermail.org/" rel="nofollow">https://astermail.org/</a><p>We built Aster Mail because we wanted end-to-end encrypted email that's actually private. All encryption and decryption happens client-side. We encrypt email content, subjects, contacts, folder structure, search indices, timestamps, and attachment data before anything touches our servers. Minimal routing metadata (sender/recipient addresses) is required for SMTP delivery, but we encrypt everything we can beyond that. On top of standard PGP, we include post-quantum cryptography by default, protecting against store-now-decrypt-later attacks.<p>Aster's feature set includes things like: free aliases & ghost aliases (auto-generated anonymous addresses), free custom domains, encrypted contacts with device syncing, burn-after-read messages, scheduled send, email snooze, encrypted search, and subscription management.<p>We ran a closed beta since early Feb and have gone through 150+ revision cycles based on tester feedback, so the product is stable and feature-complete. The entire codebase is public on GitHub and licensed under AGPL v3, and our team is here in the comments to answer questions about how it works.<p>Longer term, Aster is building a full encrypted communications suite with drive, chat, and authenticator. Aster Mail is currently available on Web, Windows/Mac, Linux, and will be available soon on iOS/Android.<p>Side note, since it'll come up: "why not just use Proton?" Proton's architecture exposes metadata to the server, which means it can be handed over in response to legal requests, and has been, repeatedly. Aster encrypts email content, subjects, contacts, and most metadata client-side. Between Aster users, we use a Signal-inspired protocol (X3DH + Double Ratchet + ML-KEM-768) that provides forward secrecy, so even if keys are compromised in the future, past messages stay protected. External emails use RSA-4096 PGP. Our architecture is designed so that even under legal compulsion, there's very little useful data to hand over.<p>We're not anti-Proton. We just think there should be an alternative that actually protects users' privacy and is practical, in an increasingly monitored world.</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:00:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47876549</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47876549</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47876549</guid></item><item><title><![CDATA[Aster Mail – End-to-end encrypted email with post-quantum cryptography]]></title><description><![CDATA[
<p>Article URL: <a href="https://astermail.org/">https://astermail.org/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47876548">https://news.ycombinator.com/item?id=47876548</a></p>
<p>Points: 1</p>
<p># Comments: 7</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:00:49 +0000</pubDate><link>https://astermail.org/</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47876548</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47876548</guid></item><item><title><![CDATA[New comment by lucasfin000 in "My MacBook keyboard is broken and it's insanely expensive to fix"]]></title><description><![CDATA[
<p>The "just buy another one" argument only works if the alternatives are even comparable. For a lot of people, macOS is a hard requirement and not a preference, so telling them just to buy a framework that runs Linux ignores that entirely. Right to repair regulation doesn't force Apple to make a worse product it just requires that the parts and repair information are available.</p>
]]></description><pubDate>Sun, 29 Mar 2026 21:14:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567395</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47567395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567395</guid></item><item><title><![CDATA[New comment by lucasfin000 in "ChatGPT won't let you type until Cloudflare reads your React state"]]></title><description><![CDATA[
<p>The real frustrating part is that Cloudflare's "definition" of suspicious keeps changing and expanding. VPN users, privacy-first browsers, uncommon IP ranges, they all get flagged. The people most likely to get caught by these systems are exactly the ones who care most about their privacy, and not the bots that they are apparently targeting.</p>
]]></description><pubDate>Sun, 29 Mar 2026 21:12:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567375</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47567375</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567375</guid></item><item><title><![CDATA[New comment by lucasfin000 in "The "Vibe Coding" Wall of Shame"]]></title><description><![CDATA[
<p>This is definitely the right question. A list of failures without any baseline won't tell you anything. You would need the same exercise for human-written code at a comparable scale before drawing any conclusions at all. Without it, it's just confirmation bias.</p>
]]></description><pubDate>Sun, 29 Mar 2026 21:09:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567348</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47567348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567348</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Police used AI facial recognition to wrongly arrest TN woman for crimes in ND"]]></title><description><![CDATA[
<p>The actual scariest part isn't that the AI got it wrong... it's that nobody felt the need to verify the AI. A tip from an anonymous caller can get investigated and found out if its true or not, and a match from a facial recognition system apparently does not. People haven't built better investigative tools they've just built better ways to skip around the investigation.</p>
]]></description><pubDate>Sun, 29 Mar 2026 21:05:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567303</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47567303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567303</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Paper Tape Is All You Need – Training a Transformer on a 1976 Minicomputer"]]></title><description><![CDATA[
<p>Post-quantum crypto is a good example of this. Lattice-based schemes were theorized in the 90s, but they took decades to actually reach production. The math existed, the hardware existed, and the ideas for making it work were just not there yet.</p>
]]></description><pubDate>Sun, 29 Mar 2026 14:24:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563413</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47563413</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563413</guid></item><item><title><![CDATA[New comment by lucasfin000 in "What if AI doesn't need more RAM but better math?"]]></title><description><![CDATA[
<p>MoE feels a lot more like engineering to me. You're routing around the problem rather than actually solving it. The real math gains are things like quantization schemes that change how information is actually represented. Whether that distinction matters long term probably will depend on whether we hit a capability wall first or an efficiency ceiling first.</p>
]]></description><pubDate>Sun, 29 Mar 2026 14:20:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563388</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47563388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563388</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Miasma: A tool to trap AI web scrapers in an endless poison pit"]]></title><description><![CDATA[
<p>The asymmetry is what makes this very interesting. The cost to inject poison is basically zero for the site owner, but the cost to detect and filter it at scale is significant for the scraper. That math gets a lot worse for them as more sites adopt it. It doesn't solve the problem, but it changes the economics.</p>
]]></description><pubDate>Sun, 29 Mar 2026 14:18:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563363</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47563363</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563363</guid></item><item><title><![CDATA[New comment by lucasfin000 in "AI overly affirms users asking for personal advice"]]></title><description><![CDATA[
<p>The tone and sensitivity thing is a real issue. A neutral prompt will get a neutral answer, but adding any emotional charge, it will immediately fold. That's not really a reasoning failure it's just a training problem. RLHF rewards whatever felt good in the moment, not whatever was actually correct. You can't prompt your way out of that one, when it's already in the weights.</p>
]]></description><pubDate>Sun, 29 Mar 2026 14:04:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563242</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47563242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563242</guid></item><item><title><![CDATA[New comment by lucasfin000 in "LinkedIn uses 2.4 GB RAM across two tabs"]]></title><description><![CDATA[
<p>uBlock origin on Firefox or Brave, which will block most of the tracker bloat, causing the RAM spike. It's not a perfect fix, but it will cut out a significant chunk of it. Tab Wrangler also helps by suspending inactive tabs automatically. You should try out both.</p>
]]></description><pubDate>Sun, 29 Mar 2026 14:01:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563218</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47563218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563218</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Emails to Outlook.com rejected due to a fault or overzealous blocking rules"]]></title><description><![CDATA[
<p>This is the price every small sender pays. The unblock request process is essentially designed to make you give up or move to a large ESP. There's no appeals process, no SLA, no acknowledgment that your reputation data might just be wrong. You're at the mercy of a system that treats false positives as acceptable damage.</p>
]]></description><pubDate>Wed, 04 Mar 2026 18:51:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47252059</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47252059</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47252059</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Nobody gets promoted for simplicity"]]></title><description><![CDATA[
<p>The awkwardness after your answered was the interview telling you something important. A team that penalizes picking the right tool over an impressive one is a team where you'll spend years creating complexity nobody needs.
The lesson isn't "next time pretend Google Sheets doesn't exist." It's that you found out early what they actually reward.</p>
]]></description><pubDate>Wed, 04 Mar 2026 18:09:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47251447</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47251447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47251447</guid></item><item><title><![CDATA[New comment by lucasfin000 in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>I dont think the argument is really about child safety. If it was tiktok would also be working on fixing their algorithm that can send minors toward harmful content, which is a far larger documented vector than encrypted DMs. This is about preserving access.</p>
]]></description><pubDate>Wed, 04 Mar 2026 17:50:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47251179</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47251179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47251179</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>That's the entire point of verified boot with custom keys, you don't need to trust Motorola or Lenovo. You can control what runs from the first boot, the threat model for a compromised supply chain is different from a backdoored chip. If you are worried about the latter that applies to every manufacturer including Google & Apple.</p>
]]></description><pubDate>Wed, 04 Mar 2026 15:13:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47248672</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47248672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47248672</guid></item><item><title><![CDATA[New comment by lucasfin000 in "Meta’s AI smart glasses and data privacy concerns"]]></title><description><![CDATA[
<p>The worst part isn't even that quote, its that nothing structurally has changed one bit since then. The business model still requires users as the product. Glasses that upload video to Meta's servers is the entire point.</p>
]]></description><pubDate>Wed, 04 Mar 2026 15:07:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47248596</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47248596</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47248596</guid></item><item><title><![CDATA[New comment by lucasfin000 in "The JVG algorithm could break RSA-2048 encryption with fewer than 5k qubits"]]></title><description><![CDATA[
<p>Even if the algorithm holds up we are still years out from a actual quantum computer that can run at scale. But that's kind of the point. NIST finalized ML-KEM in 2024 because you don't need to wait until the house is on fire to buy insurance. Harvest now decrypt later attacks are already happening today so thee migration window is closing regardless of whether quantum ever delivers.</p>
]]></description><pubDate>Wed, 04 Mar 2026 15:04:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47248542</link><dc:creator>lucasfin000</dc:creator><comments>https://news.ycombinator.com/item?id=47248542</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47248542</guid></item></channel></rss>