Feed aggregator

Part 1 the Persistent Vault Issue: Your Encryption Strategy Has a Shelf Life

Hacker News - Sun, 02/08/2026 - 12:02am

Every enterprise identity platform—from Okta and Azure AD to self-hosted password managers and privileged access management systems—shares a common architectural assumption: credentials are encrypted at rest in persistent storage. AES-256, PBKDF2 stretching, HSM key management—these are table stakes. But they're also irrelevant the moment an attacker exfiltrates your encrypted database.

The 2022 LastPass breach exposed the fundamental flaw. Attackers didn't need to defeat encryption in real-time. They copied encrypted vault data and moved it to their own infrastructure. At that point, security degraded to a single variable: how long until users' master passwords fell to offline brute-force attacks. For accounts created before 2018 with lower iteration counts, the answer was "not long enough."

The enterprise cost: -$53M+ in regulatory fines and breach remediation -Permanent loss of customer trust -Ongoing credential rotation mandates for affected organizations -Cyber insurance rate increases industry-wide

The industry response has been predictable: increase PBKDF2 iterations, mandate longer passphrases, add MFA. These are defense-in-depth measures that slow attackers down. But in an environment where attackers have unlimited time and computational resources—including emerging AI-assisted cracking and future quantum threats—slowing down offline attacks is a losing strategy.

The architectural question your board should be asking: If encrypted data exists at rest, what's your organization's exposure window before that encryption becomes obsolete?

The answer requires a paradigm shift from storage-based security to execution-based security. In a zero-persistence architecture, decryption keys are never written to disk, never cached in memory pools, never persisted in cloud buckets. They're derived ephemerally from user passphrases—manifested only for the microseconds needed to decrypt specific credentials, then immediately purged from RAM.

An attacker who compromises your infrastructure finds encrypted data with no persistent keys to target. The methodology that generates keys is decoupled from the data itself. You've eliminated the exfiltration-to-offline-cracking pipeline entirely. This isn't incremental improvement. It's rethinking what "breach" means when there's nothing persistent to steal.

Next: How blockchain verification models eliminate the vault entirely, and why your current SSO architecture can't get there from here.

Comments URL: https://news.ycombinator.com/item?id=46931447

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Agent-fetch – Sandboxed HTTP client with SSRF protection for AI agents

Hacker News - Sat, 02/07/2026 - 11:38pm

Built this because giving AI agents raw HTTP access is scary. agent-fetch is a drop-in HTTP client that blocks SSRF, DNS rebinding, private IP access, and redirect tricks — all at the request level.

It uses its own DNS resolver (Hickory DNS), validates all resolved IPs against a blocklist (loopback, RFC 1918, link-local, cloud metadata, etc.), and pins the TCP connection to the validated IP so there's no TOCTOU gap to exploit.

Also supports domain allowlists/blocklists, rate limiting, body size limits, and timeouts.

Available as a Rust crate and npm package (native Node.js bindings via NAPI).

Built for tool-based agent architectures (MCP, LangChain, etc.) where you control what the agent can call. Not a replacement for container isolation but if your agent only talks to the outside world through HTTP, this locks it down.

GitHub: https://github.com/Parassharmaa/agent-fetch

Comments URL: https://news.ycombinator.com/item?id=46931359

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Seedance 2.0 – The Most Powerful AI Video Generator

Hacker News - Sat, 02/07/2026 - 11:28pm

Experience the power of Seedance 2.0 - the revolutionary AI video generator by ByteDance. Create cinematic 2K videos with multi-shot storytelling, motion tracking, and professional quality in seconds.

Comments URL: https://news.ycombinator.com/item?id=46931334

Points: 1

# Comments: 0

Categories: Hacker News

EVs Are a Failed Experiment

Hacker News - Sat, 02/07/2026 - 11:04pm
Categories: Hacker News

CCC (Claude's C Compiler) on Compiler Explorer

Hacker News - Sat, 02/07/2026 - 11:02pm

Article URL: https://godbolt.org/z/asjc13sa6

Comments URL: https://news.ycombinator.com/item?id=46931225

Points: 2

# Comments: 0

Categories: Hacker News

Actors with Tokio (2021)

Hacker News - Sat, 02/07/2026 - 10:58pm
Categories: Hacker News

Pages