Modern NewsTopAskShowBestNew

New

Show HN: Pokémon Booster Box Restock Alerts on Amazon

by user1222 · 1 minute ago

Stop Refreshing Amazon. Get Emailed When It Restocks. Pokémon booster boxes and Elite Trainer Boxes on Amazon sell out without warning and restock unpredictably. Set a free Pokémon TCG restock alert and get an email the instant your set is back in stock at your target price. No more manual checking.

1|www.pricedropnotifications.com|0 comments

How Will OpenAI Compete?

by chmaynard · 1 minute ago

1|www.ben-evans.com|0 comments

Childhoods of Exceptional People (2023)

by Kinrany · 1 minute ago

1|www.lesswrong.com|0 comments

Bell Labs: Birthplace of Your Favorite Technology

by ripe · 2 minutes ago

1|www.nytimes.com|0 comments

Tiny falcons are helping keep the food supply safe on cherry farms

by PaulHoule · 2 minutes ago

1|insideclimatenews.org|0 comments

Tool Shaped Objects

by tosh · 3 minutes ago

1|x.com|0 comments

Warren warns Fed, Treasury against crypto bailout

by petethomas · 4 minutes ago

2|www.americanbanker.com|0 comments

How to Raise Children

by colinprince · 5 minutes ago

1|buttondown.com|0 comments

Ask HN: Is structured community validation a real alternative to cold outreach?

by dmitryivanovdev · 5 minutes ago

A founder posts about their idea, gets a few "looks cool" comments, and walks away with nothing useful. I keep seeing this happen.

Community posts disappear fast. Launch platforms want a finished product. Cold outreach is slow.

I'm testing whether a structured project page (problem, solution, early evidence) lets potential users make a real yes/no call in 30 seconds without signing up. And whether indie founders will give structured feedback to each other out of reciprocity.

Maybe users need to try something before they know if they want it. Maybe founders won't bother with a form and just drop a link anyway.

Has anyone tried collecting structured feedback from communities in a repeatable way? What broke?

1||0 comments

Stop Chasing IP Changes

by emrekutlu · 5 minutes ago

1|cafe.io|1 comments

Study shows colorblind subjects have difficulty judging rocking chair usefulness

by jMyles · 7 minutes ago

1|pickipedia.xyz|1 comments

Flagging Policy

by josefritzishere · 7 minutes ago

1|news.ycombinator.com|1 comments

Show HN:Edge Veda – A framework for resource-aware edge computing

by ram2497 · 7 minutes ago

2|github.com|1 comments

Launch It 3 Times

by colinprince · 8 minutes ago

2|www.anildash.com|0 comments

Four Things OpenClaw Got Right

by nr378 · 8 minutes ago

1|deadneurons.substack.com|0 comments

Mail rules on Fastmail that make my life better (2025)

by arm · 8 minutes ago

1|json.blog|0 comments

Show HN: I Built Zero-Knowledge .env Sharing

by AleksDoesCode · 9 minutes ago

Hey everyone,

Small disclaimer upfront: English is not my native language. This post was translated/polished with the help of AI, but the words and meaning are 100% mine.

I run a small software development agency in Germany. Every week, the same thing happens: >A client needs to send us database credentials >A freelancer needs API keys >Someone new joins and needs the .env file

And every time, the same pattern:

>Pasted into Slack

>Sent via email

>Dropped into a Google Doc called “keys for dev”

>Shared with “anyone with the link” enabled

Not because people are careless. Because there was no easy alternative.

Proper vault setups take time. Enterprise secret managers are overkill for many small projects. CLI tools are powerful, but nobody installs them unless forced to.

What I needed was simple:

Upload a file → share a link → done. But encrypted before it ever leaves the browser.

So I built SecretDrop.dev.

What it does

1. Client-side encrypted file sharing

Files are encrypted in the browser using AES-256-GCM Key derived via PBKDF2 (600k iterations) Encryption happens before any data touches the server Recipient enters the password → file decrypted in their browser

The server never sees:

>The file contents

>The password

>The decrypted file

>The filename

Everything runs on WebCrypto. No third-party crypto libraries.

2. Zero-knowledge architecture

The server stores only encrypted blobs and minimal metadata required for routing.

It cannot read:

>File content

>Passwords

>Decrypted filenames

The threat model is simple: If the server is compromised, attackers still cannot decrypt the files without the password.

3. Direct end-to-end transfer (Premium)

For workflows where passwords are annoying:

>Select recipients by email

>Files encrypted with their public key (ECIES)

>No shared password required

>Only the intended recipient can decrypt

>Sender identity verified via digital signature

This removes the “send password via Signal” step entirely.

4. Auto-expiry & access analytics

Expiration after time or download count Basic access visibility (without breaking zero-knowledge model)

Why I made the free tier free

Password-protected encrypted sharing is free. No credit card. No trial. No artificial limits.

Because securely sharing a .env file shouldn’t be a paid feature. Security in code should be normal, not enterprise-priced.

Why not just use XYZ Tool or Vault?

Good question.

There are great tools out there. But in many small dev teams:

>Nobody wants to set up a full Vault instance

>Secret managers are too heavy for quick one-off sharing

>People default to Slack because it's frictionless

The real competitor isn’t a vault.

It’s “paste in Slack.”

So I optimized for:

>Zero setup

>No account required (for password mode)

>One link, done

What’s next

I’m exploring two things:

VSCode extension Right-click .env → “Share via SecretDrop” → get link.

CLI tool secretdrop share .env --expires 24h

Both are early ideas. I want to integrate into real dev workflows instead of forcing a new one.

If either would be useful for you, I’d love to understand how you’d use it.

Questions for the HN crowd

>What would make this useful in your workflow?

>Any concerns about the security model?

>Would you prefer Argon2 over PBKDF2 in the browser?

>What attack vectors am I overlooking?

>What would make you trust this enough to use it in production?

I built this because I was tired of seeing secrets floating around in Slack threads. I use it daily inside my own agency.

If you want to rip apart the crypto model, architecture, or UX decisions — please do.

Curious to hear what you think.

Cheers Aleks

2|secretdrop.dev|0 comments

Mdview.io – a Markdown viewer built for humans

by Igor_Wiwi · 9 minutes ago

1|mdview.io|0 comments

SpaceX rocket fireball linked to plume of polluting lithium

by jeffwass · 9 minutes ago

1|www.bbc.co.uk|0 comments

Publishing AI Agent Identity to DNS (GoDaddy ANS and MuleSoft Agent Fabric)

by tmuhlestein · 13 minutes ago

1|aboutus.godaddy.net|1 comments