Hacker Newsnew | past | comments | ask | show | jobs | submit | mrl5's commentslogin

Thank you. First explanation what might be the root cause :)


This is an interesting alternative to password manager, esp. if you want to version control your secrets https://github.com/getsops/sops


+1 for sops, I've used it across a dozen projects for keeping encrypted secrets directly in the repo. And for configuring infra with Terraform, the sops provider [1] is extra convenient.*

[1] https://github.com/carlpett/terraform-provider-sops

* With the standard caveat that you should audit any software you're planning on giving access to your most valuable secrets.


I'm a huge fan of SOPS, especially since it can integrate with numerous crypto providers, from `age` for a fully offline crypto source to Hashicorp Vault and big cloud secret / crypto providers.

I wanted a tool that allowed me to store secrets safely without tossing them in plain text env files called `sops-run`. It manages yaml manifests to store your environment variables based on the name of the binary you're running, and only applies the environment variables to the context of app you're running. I never did tidy this up into an installable python package so it can't be easily installed with pipx yet (I keep putting off finishing all of that, pull requests welcome ;-) ), but I like it better than simply using direnv or equivalents, since it doesn't load the environment variables into the shell context, though it could probably be combined with it to hot-load shell aliases for the commands you want to run.

https://github.com/belthesar/sops-run


Sops is probably ideal for lowest ceremony possible. Combine this with direnv for a seamless experience.

If you don't want to commit/share secrets you could avoid sops and put this in your direnv envrc: `[ -e ~/.local/secrets/myproj.env ] && source ~/.local/secrets/myproj.env`


Worth stating some options for newcomers:

- It let's you decrypt same file using multiple credentials/keys (every team member has its own)

- it can use cloud vaults for encryption/decryption - for instance, keep your keys in Azure Key Vault or similar, and let the team access that using their own setup of AZ cli and SSO login you use to interact with the cloud anyway

- it will be able to keep the encrypted file semantically correct, so you still can use linter checks on push to git, etc


thanks for letting me know about sops! looks useful for this


I wonder why pgtyped [1] was skipped

[1] https://github.com/adelsz/pgtyped



While trying to find out more comparison information, found this light on details issue:

https://github.com/containers/bubblewrap/issues/81

It mentions nsjail and minijail.


"It is still being assembled deep inside a mountain in west Texas. The Clock provides a rare invitation to think and engineer at the timescale of civilization. It offers an enduring symbol of our personal connection to the distant future."



Interesting fact that under the hood it's based on tANS introduced by Jarosław Duda from Jagiellonian University:

some cool references:

https://www.youtube.com/watch?v=uXtmN9fE01k

https://th.if.uj.edu.pl/~dudaj/

https://demonstrations.wolfram.com/DataCompressionUsingAsymm...

https://encode.su/threads/2078-List-of-Asymmetric-Numeral-Sy...


Well, the entropy coding step is. Which is just one of multiple parts of the data compression. But entropy coding typically is the bottleneck in encoding/decoding speed, yes, and Duda's work is impressive (also because he took on Google when the latter didn't appear to keep their no-software-patents promise that they. made when they first started collaborating. The man stands up for his principles)



>PhD in Theoretical Physics, PhD in Theoretical Computer Science, MSc in Theoretical Mathematics

well, impressive


Also look at the time line! The dude started three 4-year masters courses (c.s., theo.math., theo.phys.) in a one-year stagger, so during 2001-2004 he was doing all three in parallel. The man seems to be quite the beast, even if he was probably able to reuse quite a bit of that math!


I'm not sure why this is an interesting fact, could you explain?


## my main motivation for developing `vulner`

1. learn rust by doing something tangible

2. improve security of funtoo linux (or gentoo, or any other distro that uses portage)

## my main motivation to share it on Hacker News

I'd like to gather some feedback related to (but not limited to):

1. user experience

2. potential improvements

3. source code (sth like code review)

... and maybe even get new users and/or contributors :)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: