Hacker Newsnew | past | comments | ask | show | jobs | submit | akshat666's commentslogin

I’ve been working on an open-source project called Ephemeral-First Security (EFSF). The core idea is to treat expiration as a first-class security primitive rather than relying only on long-lived secrets + revocation.

The project provides small SDKs (TypeScript, Python, Java) for building systems where identities, credentials, sessions, and access artifacts are time-bound by default and automatically invalidated.

This grew out of building a privacy-focused ephemeral browsing system, where we found that deletion + forced teardown often reduced risk more effectively than encryption alone in certain threat models.

Current features focus on: -Explicit TTL semantics for security artifacts -Deterministic expiration and teardown hooks -Language-agnostic design (same model across TS / Python / JVM) -Alignment with common threat-modeling practices (short blast radius, no silent persistence)

Repos / packages: GitHub: https://github.com/akshat666/ephemeral-first-security-framew... npm: https://www.npmjs.com/package/@efsf/typescript PyPI: https://pypi.org/project/efsf/

This is early but stable. I’d really appreciate feedback on: -Whether “ephemeral-first” is a useful abstraction in real systems -Where this breaks down in practice -What you’d want to see to adopt something like this

Happy to answer questions or discuss trade-offs.


This is gold. so much to learn from this . Interesting to see how more limitations have curved the logic for each.


Good luck with that :)


That is a good demo right there. Any way to speed up the v86 on the browser ?


Very good suggestions. Making it a bit modular and flexible. Initial idea was to avoid any jump like a kernel etc. But very good points.


Thanks Joe! This should fixed now :)


Built this as a personal challenge. No OS, no drivers — just x86 assembly and BIOS. 512 bytes exactly. Boots in QEMU.

Run it: nasm -f bin pong.asm -o boot.bin qemu-system-x86_64 boot.bin

GitHub: https://github.com/akshat666/-bootponggame


Nice! So you wrote this three years ago according to the git timestamps?

You can add it to the list at https://gist.github.com/XlogicX/8204cf17c432cc2b968d138eb639... I think there are already at least two Pong game there.


Yes, 3 yrs but still fun. I have seen some games in boot sector. Its super cool.


Challenge: `cpu 8086` rather than `use16`.


well well well


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: