Hacker Newsnew | past | comments | ask | show | jobs | submit | elasticdog's commentslogin

I had attempted to create a pass for my local library in the past, but never got a working barcode, and this post helped me to understand the issues I was hitting.

I was able to adapt the OP's shell script to generate a working Codabar image (after I figured out that my local library used "A" and "T" as beginning and end markers) that matched the physical card exactly, and there was enough useful metadata for me to piece together a working pass using that barcode as a store card's background image. I ended up using the Pass2U Wallet iOS app directly, rather than hacking around signing keys, but found the documented process helpful.


Ah, so the author granted you a license to adapt the code; that's good to hear.


That's essentially what https://krypt.co/ is...I've used Yubikeys in the past, but have been on Krypton for maybe the past year or so. No problems with it at all, aside from GitHub recently (within the past couple of weeks) not recognizing the authorization despite it working just fine elsewhere. I haven't had a chance to dive deeper into why.


I had not heard of krypton; read over the website based on your suggestion and got excited, but my excitement turned to disappointment when I saw that neither the iOS nor android apps have been updated in nearly 2 years. Makes me wonder if the project is still active or not, and don’t want to invest effort in trying out a tool that’s effectively abandoned.


Wonder if it has anything to do with the project getting acquired by Akamai


I’m sure that’s what happened; eg I’m sure it was an acqui-hire and Akamai didn’t give a hoot about the krypton software


Tiddlywiki is what I use to manage my own personal Zettelkasten as well; it's pretty well suited for the task. There's a bit of ugliness when renaming Tiddlers, but for a lot of inter-related topics, I add an automatically-generated list of backlinks like this:

  !!!! Backlinks
  <<list-links "[all[current]listed[]!has[draft.of]!is[system]]">>


I prefer using the [United Nations Code for Trade and Transport Locations](http://www.unece.org/cefact/locode/service/location.html) (UN/LOCODE) value based on the address of the host's data center. It covers more specific locations than something like the IATA airport codes, and is still a well defined standard.


Most ISPs will usually use the icann standard two letter ccTLD for the country where the pop is, which is usually similar to what you linked, but not always.


The workaround for 1) was already posted, but for 2), you can use Vimium's "insert mode" by pressing `i` to do the same thing. I use it regularly for Reddit with the enhancement suite.


Still western-focused, but Oren Tirosh's mnemonic encoding [1] project is pretty close as well.

[1] http://web.archive.org/web/20090918202746/http://tothink.com...


Similarly, proquint.


So, I've skimmed through most of the paper, and it seems like a bit of an apples to oranges comparison. My understanding is that GV2 is an extension to jGit that essentially performs GC on the repo (or more accurately waits to encrypt until post-GC), and then transparently encrypts everything altogether, rather than utilizing clean/smudge filters to encrypt files individually like the tools it's comparing itself to. It's funny that the author dismissed git-remote-gcrypt as being "under development" even though it's a much closer comparison to GV2.

The paper mentions that it's measuring the worst-case scenario for the clean/smudge filter-style tools as it's much more likely that you only need to protect a few files and not the entire repository, but I didn't see how the second section actually reflected this more-realistic scenario. I'm not saying that encrypting the entire repository is bad, but the overhead of using filters to encrypt the entire repository is a documented/known limitation of the other tools...so it seems a little odd to gloss over that.

Side note, stuff like "This process is repeated a total of 10 iterations for an ample sample size to draw statistical conclusions." worries me, but that's another conversation.

Overall though, glad to see more research in this area, and it sounds like GV2 might be a decent solution for people looking to protect their data in certain scenarios.


I agree, I'm happy to see more research here. For my uses, a filter based approach makes the most sense, though I can understand wanting a more holistic solution.

My needs are such that I might only want to encrypt a few files, and filters do an adequate job here. But I can understand a limitation where all objects must be encrypted, and thus filter perf is not appropriate.

Filters also have the limitation of leaking the commit and tree information, which may also be sensitive data on some projects.

This is an interesting strategy, and I'm glad to see more research done here, regardless.


Cool to run across a mention of one of my projects (transcrypt) out in the wild. I do like that blackbox isn't tied to just Git, and uses GPG...but that can also be difficult for adoption if GPG isn't a familiar tool on your team.


FYI, the main project is now located and maintained at [1]. Avery let someone else take over since he no longer had time for it [2].

[1] https://github.com/sshuttle/sshuttle

[2] https://groups.google.com/d/msg/sshuttle/jdTzJGjTDMg/IcQkCzb...


If you're interested in decentralized mesh networks, take a look at Project Meshnet [1], Hyperboria [2], and the cjdns [3] routing software. It's a small, but growing community of people working in a similar space as the edgenet idea mentioned in the post. Decentralized routing and end-to-end encryption, plus there are already hundreds of dedicated nodes bootstrapping communication over the existing Internet.

[1] http://projectmeshnet.org/ [2] http://hyperboria.net/ [3] https://github.com/cjdelisle/cjdns


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: