Hacker News

Goal: Ship 1M Lines of Code Daily

Hacker News - Sun, 02/08/2026 - 12:42am

Life is good.

Comments URL: https://news.ycombinator.com/item?id=46931629

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Codex-mem, 90% fewer tokens for Codex

Hacker News - Sun, 02/08/2026 - 12:39am

I built codex-mem to give Codex persistent memory across sessions.

Benchmarked result: - 99.84% token reduction (379,275 -> 596) - ~60ms median to first memory context

It uses progressive retrieval (search -> timeline -> details), plus MCP tools and local-first privacy. Repo: https://github.com/StartripAI/codex-mem

Comments URL: https://news.ycombinator.com/item?id=46931620

Points: 1

# Comments: 0

Categories: Hacker News

LineageOS 23.2

Hacker News - Sun, 02/08/2026 - 12:33am

Article URL: https://lineageos.org/Changelog-31/

Comments URL: https://news.ycombinator.com/item?id=46931595

Points: 1

# Comments: 0

Categories: Hacker News

Crypto Deposit Frauds

Hacker News - Sun, 02/08/2026 - 12:32am

Comments URL: https://news.ycombinator.com/item?id=46931591

Points: 1

# Comments: 0

Categories: Hacker News

Are there anyone interested about a creator economy startup

Hacker News - Sun, 02/08/2026 - 12:28am

heyy! i am looking for to coonect with the people who are interested on creator economy startups and companies

Comments URL: https://news.ycombinator.com/item?id=46931578

Points: 1

# Comments: 0

Categories: Hacker News

Zram as Swap

Hacker News - Sun, 02/08/2026 - 12:12am
Categories: Hacker News

Show HN: StyloShare – privacy-first anonymous file sharing with zero sign-up

Hacker News - Sun, 02/08/2026 - 12:06am

Hi HN,

I built StyloShare, a small web app for anonymous, one-off file sharing.

The idea was to remove everything that usually gets in the way

Key points:

Anonymous by default

Files auto-expire

Simple UX, works on low-end devices

Built with a focus on performance and minimal client overhead

Happy to answer technical or architectural questions.

Thanks!

Comments URL: https://news.ycombinator.com/item?id=46931465

Points: 1

# Comments: 0

Categories: Hacker News

Part 1 the Persistent Vault Issue: Your Encryption Strategy Has a Shelf Life

Hacker News - Sun, 02/08/2026 - 12:02am

Every enterprise identity platform—from Okta and Azure AD to self-hosted password managers and privileged access management systems—shares a common architectural assumption: credentials are encrypted at rest in persistent storage. AES-256, PBKDF2 stretching, HSM key management—these are table stakes. But they're also irrelevant the moment an attacker exfiltrates your encrypted database.

The 2022 LastPass breach exposed the fundamental flaw. Attackers didn't need to defeat encryption in real-time. They copied encrypted vault data and moved it to their own infrastructure. At that point, security degraded to a single variable: how long until users' master passwords fell to offline brute-force attacks. For accounts created before 2018 with lower iteration counts, the answer was "not long enough."

The enterprise cost: -$53M+ in regulatory fines and breach remediation -Permanent loss of customer trust -Ongoing credential rotation mandates for affected organizations -Cyber insurance rate increases industry-wide

The industry response has been predictable: increase PBKDF2 iterations, mandate longer passphrases, add MFA. These are defense-in-depth measures that slow attackers down. But in an environment where attackers have unlimited time and computational resources—including emerging AI-assisted cracking and future quantum threats—slowing down offline attacks is a losing strategy.

The architectural question your board should be asking: If encrypted data exists at rest, what's your organization's exposure window before that encryption becomes obsolete?

The answer requires a paradigm shift from storage-based security to execution-based security. In a zero-persistence architecture, decryption keys are never written to disk, never cached in memory pools, never persisted in cloud buckets. They're derived ephemerally from user passphrases—manifested only for the microseconds needed to decrypt specific credentials, then immediately purged from RAM.

An attacker who compromises your infrastructure finds encrypted data with no persistent keys to target. The methodology that generates keys is decoupled from the data itself. You've eliminated the exfiltration-to-offline-cracking pipeline entirely. This isn't incremental improvement. It's rethinking what "breach" means when there's nothing persistent to steal.

Next: How blockchain verification models eliminate the vault entirely, and why your current SSO architecture can't get there from here.

Comments URL: https://news.ycombinator.com/item?id=46931447

Points: 1

# Comments: 0

Categories: Hacker News

Pages