Friday, October 25, 2024

Show HN: Infinite SCP Generator https://ift.tt/raAbIcJ

Show HN: Infinite SCP Generator I work at .txt, the Outlines maintainers, and did this as a fun side project. I used Outlines to structure language model output in the format of an SCP entry. SCP entries have a specific structure. It's easy to get a language model to generate these structures via JSON without fail -- no parsing errors, no trailing commas, no missing brackets. Outlines ensures that all text generated will follow the SCP structure. We're also testing an internal structured text API, and figured this might be a good way to test out repeated, regular calls. Entries are generated at midnight and uploaded to a simple website. Check out the resulting entries here: https://ift.tt/WMYbVS6 https://ift.tt/oL2zw6T October 24, 2024 at 11:46PM

Show HN: A shim/command-line tool to use Bluetooth Classic features on Windows https://ift.tt/EmJeBo3

Show HN: A shim/command-line tool to use Bluetooth Classic features on Windows https://ift.tt/gejtfdm October 24, 2024 at 10:27PM

Thursday, October 24, 2024

Show HN: Debugging LLM Failures Like "9.11 > 9.9" via Interpretability https://ift.tt/UvaD4GH

Show HN: Debugging LLM Failures Like "9.11 > 9.9" via Interpretability https://ift.tt/Ll4KSR3 October 23, 2024 at 10:58PM

Wednesday, October 23, 2024

Show HN: OVault – Simple and Local OTP Management for iOS/macOS https://ift.tt/P6VAEp7

Show HN: OVault – Simple and Local OTP Management for iOS/macOS OVault is a super simple iOS and macOS app that lets you store and view your OTP codes for two factor authentication. I found that my personal favourite OTP app Authy seemed to be getting worse with each iOS release. Its usability has never been great, and iOS 18 meant that it lost its Home Screen Widget that let me view my OTP codes without opening the app. I decided to switch to another app, then became frustrated that I couldn't easily export my secrets from Authy. Of course I'm sure there are good security related reasons for this, but I didn't want to migrate all my OTPs just to end up in the same situation in the near future. I also didn't want to have to trust another external service with my OTP secrets being stored on their servers (irrational I'm sure). The obvious answer for this would be to use Apples new 2FA support in Keychain, however the usability for this outside of Safari autofill isn't great either. So that's the long-winded reason for why I built my own OTP app. I hope that anyone else feeling the same way will find this app useful. Of course, learning how TOTP codes works was a nice bonus for my curiosity. OVault stores your OTP metadata inside your devices Keychain, so that you don't have to trust any new service with your data. Unless you have iCloud Keychain enabled, this also means your secrets never leave your device. If you do have iCloud Keychain enabled, your OTP metadata will be synced between all your devices, which ensures your data is never lost. The app provides widgets that you can put in your iOS Home Screen or macOS Notification Center so that you can view your OTPs without opening the app. This was my favourite feature of Authy (until iOS 18). To the best of my knowledge, OVault supports all TOTP codes that are compliant with RFC6238 [1], which means that it supports codes of lengths 6-8, three hash algorithms (SHA1, SHA256, SHA512), and all suggested time periods (15s, 30s (default), 45s, 60s). Exposing these options means that it supports a wide array of TOTP codes, even those that seem non-standard (like those used in HID Approve MFA and other "proprietary" 2FA solutions). Your OTP secrets are yours, so OVault allows you to view the saved secret on demand. This gives you enough information to import your OTPs to any other authenticator you want, avoiding lock-in to a specific app. It's worth mentioning that this app isn't designed to be "super high" security. If you already use Keychain for your passwords, you'll find yourself storing OTP secrets and passwords in the same database. Depending on your threat model, this may not be ideal. For me, I'm happy with threat model this leaves me with (I personally prefer to trust fewer parties), but everyone should critically evaluate if this works for them. If you want to evaluate the app, here's how to add a sample OTP: 1. Tap the "+" button in the toolbar, then tap "+ Manual" 2. Switch to the "From URL" tab 3. Paste in the following URL: otpauth://totp/Example:alice@example.com?secret=JBSWY3DPEHPK3PXP&issuer=Example I'd love to hear any feedback, this has been a fun side project and it would be fun to see if it's useful at all to anyone else. [1] https://ift.tt/9UO7cr4 https://ovault.net October 23, 2024 at 01:13AM

Show HN: I made a tool for curating and sharing links as lists https://ift.tt/g02slaW

Show HN: I made a tool for curating and sharing links as lists https://snack.xyz/ October 23, 2024 at 02:06AM

Show HN: I made a Sonic runner game in JavaScript https://ift.tt/emD9Sbt

Show HN: I made a Sonic runner game in JavaScript https://ift.tt/Xni10Zm October 19, 2024 at 02:36AM

Show HN: I built a tool that helps people scan and clean any repo for secrets https://ift.tt/1mhurVc

Show HN: I built a tool that helps people scan and clean any repo for secrets https://securelog.com/ October 22, 2024 at 11:48PM

Show HN: Anti-Cluely – Detect virtual devices and cheating tools on exam systems https://ift.tt/onuTQWR

Show HN: Anti-Cluely – Detect virtual devices and cheating tools on exam systems Anti-Cluely is a lightweight tool designed to detect common...