Hacker News

Subscribe to Hacker News feed
Hacker News RSS
Updated: 7 min 57 sec ago

Show HN: ExamJungle – AI-driven exam simulators for IT certifications

Sun, 03/01/2026 - 2:08am

Hi HN,

I’m building ExamJungle, an educational platform for IT certification prep (AWS, Azure, CompTIA, etc.).

Most existing resources are just static PDF dumps or basic quiz apps. We’re trying to build something more interactive by integrating "Caesar AI." It’s designed to do more than just give an answer key; it explains complex infrastructure concepts and can dynamically adjust question difficulty based on a user's weak points.

Key features: - Realistic timed environments that mimic the actual exam UI/UX. - Caesar AI for on-demand technical explanations. - Peer benchmarking and performance analytics to track readiness. - Mobile-responsive for studying on the go.

I’d love to get your feedback on the AI implementation and the overall UX of the practice paths.

Thanks!

Comments URL: https://news.ycombinator.com/item?id=47204398

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: Long-term recoverable digital vault without a master key?

Sun, 03/01/2026 - 2:08am

I’m exploring a long-term encryption design where a master key is never stored — only reconstructed.

The goal is a vault that can be recovered 10+ years later without writing down or backing up any master password. The only dependency should be stable long-term human memory.

The approach:

Instead of storing a password, the final encryption key is derived from multiple personal answers in sequence using Argon2.

k0 = seed

k1 = Argon2(answer1, salt = k0)

k2 = Argon2(answer2, salt = k1)

...

kn = Argon2(answern, salt = kn-1)

Final key = kn.

Properties:

No concatenation of answers

No static master password

Each step depends strictly on the previous

Memory-hard derivation (Argon2 at every step)

Brute forcing cannot be parallelized across answers

The vault is structured as nested encrypted layers. Each layer contains the next question and the next encrypted payload. You must answer each question correctly to decrypt the next layer. The file never stores the master key — only encrypted guidance for reconstructing it.

There’s a working prototype. Deterministic reconstruction works as long as the answers and seed remain unchanged.

My open architectural question is about the root seed (k0).

Right now k0 is derived from the container hash. But it could be any deterministic reproducible value.

What would be a robust long-term root of trust for a system that must remain recoverable after 10+ years without storing secrets?

Constraints:

Must be reproducible

Must not depend on external services

Must not introduce a new single point of failure

Must remain stable over a decade

Is using a file hash reasonable? Should k0 be user-derived? Should it be fixed and public?

More fundamentally: is relying on long-term human memory as a cryptographic reconstruction mechanism inherently flawed?

I’d especially appreciate critique around entropy assumptions, threat models, and long-term survivability risks.

Comments URL: https://news.ycombinator.com/item?id=47204396

Points: 1

# Comments: 0

Categories: Hacker News

FYI ChatGPT Plus credit if you delete before term ends

Sun, 03/01/2026 - 2:02am

I cancelled my subscription yesterday but it was going to last through March 11. Got my data export today so I just went ahead with deleting my account (figuring the next 10 days was a sunk cost).

I just got a pro-rated refund of $6.78 for the remainder of the term, so FYI if you want to stick it to them even more!

Comments URL: https://news.ycombinator.com/item?id=47204377

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: The Dot

Sun, 03/01/2026 - 1:54am

The Dot, a Political Game part of The Lowball.

Comments URL: https://news.ycombinator.com/item?id=47204340

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: Is there something like Google style guide for AI-only coded apps?

Sun, 03/01/2026 - 1:51am

The Google style guide for C++/Java/Python are opinionated, hard fought, wise, and they elimate a large source of errors while minimizing harmful, unneded inconsistences. They picked a style that made great realistic use of the best cognition at the time.

The intent is still great, but now we should think about writing good general rules for building programs that are essentially all AI generated. What generic wisdom leads to flexible, auditable, composable and robust apps and systems?

Comments URL: https://news.ycombinator.com/item?id=47204331

Points: 1

# Comments: 1

Categories: Hacker News

Observability Theatre

Sun, 03/01/2026 - 1:49am
Categories: Hacker News

Ask HN: How do we solve the bot flooding problem without destroying anonymity?

Sun, 03/01/2026 - 1:41am

AI posts are becoming indistinguishable from human posts, and we can see it here on HN. The conventional response by website operators is to put in progressively tighter verification systems to distinguish bots and humans, but that eventually leads to the end of anonymity.

This is not an anti-AI rant. If a future AI agent truly has high quality posts and wants to use the site normally, that's fine. I'm talking about spam campaigns with hundreds of new accounts. We need new solutions to this problem.

I'll start by proposing a solution that could work for HN and similar forums. Feel free to iterate on it or propose your different ideas in the comments. Here goes:

For logged-in users, instead of ranking posts and comments on the server-side, the server only delivers a chronological feed + the current logged-in user's voting history.

Using the chronological feed as the base, each of your past votes changes the ranking of your feed by a tiny bit, and that's calculated client-side. You're more likely to see posts and comments from users you've upvoted in the past at the top.

In short, this means a new account will see a completely chronological feed, while an established account will see a feed modified by only their own past votes.

The public feed for non-logged-in users would still be ranked by the server. No changes there.

So each user gets a fully personalized bubble when logged in, except it's not a bubble because n=1. And it's really easy to break out of the bubble by logging out.

Spam bots can post and vote all they want, but they won't change the core userbase's experience that much, because the bots will only have access to a chronological feed. It has no taste, which is accumulated over time, and therefore can't spam votes and replies on real conversations nearly as much.

Comments URL: https://news.ycombinator.com/item?id=47204278

Points: 3

# Comments: 1

Categories: Hacker News

Ask HN: What are you working on? (March 2026)

Sun, 03/01/2026 - 1:29am

Comments URL: https://news.ycombinator.com/item?id=47204228

Points: 1

# Comments: 0

Categories: Hacker News

Pages