Hacker News new | past | comments | ask | show | jobs | submit | arete's comments login

I've been a Virtual Post Mail (https://www.virtualpostmail.com/) customer for 10 years so far and they've been great. Reliable and very quick to respond to support emails on the rare occasion it was needed.


Awesome work, this is a really cool idea and well executed.


I hadn't heard of borg before, but it appears to be a backup program. arc is a file archiver, like tar or zip.


Indeed. One use case I have in mind is using the Shamir Secret Sharing mode to create N backups on separate flash drives stored in diverse locations.


Safari Blocker is great, thanks Luke! Being able to add rules on the fly is really handy.


Thanks a ton! Lots of great features planned in updates: user whitelisting in Safari, better default blockers, native iPad support, OSX extension. Will continue to be free


Conversely, check out Yoyogi park on the Monday after a hanami weekend. The ground is covered in garbage, broken bottles, cans, etc. Or check out the square at Shinbashi station after the salarymen finish their impromptu outdoor happy hour. All flat surfaces are littered with convenience store wrappers, empty beer cans and cigarette butts.


The culture of conformity is at work even during times of disobedience. ;)

edit: Kind of like "cut days!"


Can't comment on trustworthiness but Kernel Concepts sells a nice OpenPGP smartcard developed by Werner Koch, the GnuPG guy.

http://shop.kernelconcepts.de/product_info.php?products_id=4...


I like those, but I really really want something which can do bt 4.0le with an existing pairing (stronger than just bluetooth 4.0 le security, though) between my host (ideally, mac/win/linux desktop/laptops, also phones) and the device, with some level of on-device logging, access control, etc.

A type 2 pinpad + openpgp smartcard might be the best practical thing right now -- a PIN on the card, plus a passphrase from the host (I think you can require both?). Type 3 showing a hash of what you sign, or a serial number of number of signs, would be even better.

The GPF cryptostick (usb) is also nice -- I think you could also take the Werner smartcard and cut it down to a smaller size for a USB stick sized reader. Sadly GPF stick 1.2 is out of stock everywhere.


> I think you could also take the Werner smartcard and cut it down to a smaller size for a USB stick sized reader

Yup, personally I've stuck my OpenPGP card in a Gemplus GemPC USB Shell Token v2:

http://www.cdw.com/shop/products/Gemplus-GemPC-USB-Shell-Tok...

If you get the OpenPGP card with a SIM cut-out, assembly is a breeze. Almost as good as a GPF stick.


Yeah, Kernel Concepts sells the OpenPGP card in a SIM breakout style too.

I really wanted the CryptoStick, looks like they're temporarily about of stock pending the new 2.0 revision, but not holding my breath.


Yeah, I guess I just don't trust smartcards all that much from a hardware security perspective, vs. modules with battery inside a metal envelope. I'm sad Maxim/DS killed the Crypto iButton line -- it was a great compromise between smartcard cost ($20-30) and HSM physical security. The software was never great, though.


keys (https://github.com/wg/keys) is the password manager I've always wanted. It's a client/server application with a command line UI, and the server can run on a mobile device so your credentials are available wherever needed.

keys is open source (GPLv3) and includes a basic Android app that runs the server. The code should run on iOS as well, but the lack of background networking is an issue.

keys provides strong protection for credentials. For details please read SECURITY, but to summarize everything is encrypted with AES in GCM mode using a randomly generated key, which in turn is encrypted with with a key derived from a password via the scrypt KDF. Network communication occurs over mutually authenticated TLS 1.2 connections.

If you'd like to try the Android app without the hassle of building it yourself, please join https://groups.google.com/forum/#!forum/keys-app and I'll send you a Play store beta test link.

Enjoy!


The RDRAND circuits perform continual health checks and will signal a error instead of outputting bad data. See section 3.3 of http://software.intel.com/en-us/articles/intel-digital-rando...


RDRAND can do > 500MB/s when invoked by 8 threads running in parallel: http://software.intel.com/en-us/articles/intel-digital-rando... the theoretical maximum is 800MB/s

I wrote an x86-64 asm impl as part of my lightweight Java crypto library (https://github.com/wg/crypto) would be easy to drop into any C program: https://github.com/wg/crypto/blob/master/src/main/asm/rdrand...

Intel released an open source library too, though in tests my asm impl was faster ;-) http://software.intel.com/en-us/tags/20757


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: