TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Send encrypted secrets from the command line

117 pointsby paulfurleyover 6 years ago

12 comments

tptacekover 6 years ago
The tool for this that everyone I know uses is Magic Wormhole. Wormhole has a more straightforward security model and is more thoughtfully designed: it uses a PAKE and relies on out-of-band secret sharing, rather than attempting a registry of &quot;verified&quot; public keys.<p>You should probably just use Wormhole.<p><pre><code> pip install magic-wormhole</code></pre>
评论 #18880370 未加载
评论 #18882222 未加载
评论 #18881365 未加载
y0ghur7_xxxover 6 years ago
I made something similar, but the payload gets encrypted with the users ssh rsa key instead of pgp (that not many use):<p><pre><code> .&#x2F;sshencdec.sh -p &lt;(curl -sf &quot;https:&#x2F;&#x2F;github.com&#x2F;S2-.keys&quot; | \ grep ssh-rsa | tail -n1) &lt; plain-text-file.txt </code></pre> It&#x27;s just a simple bash script really, but it works, and almost everyone has a github account and an ssh key set up, so it works out of the box with most developers.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;S2-&#x2F;sshencdec" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;S2-&#x2F;sshencdec</a>
评论 #18875556 未加载
BillinghamJover 6 years ago
To be honest this just seems like an insecure version of Keybase.<p>The key thing with Keybase is that it cryptographically verifies your public keys against public statements published to accounts people know you by - eg your Twitter, Facebook, etc.<p>The difficult bit isn&#x27;t encrypting and sending. The difficult bit is the original key exchange. Keybase has dealt with this without you having to trust Keybase itself.
koolbaover 6 years ago
&gt; Fluidkeys automatically fetches keys based on the verified email address and encrypts the secret to the key.<p>Fetches from where? Public key servers?<p>Anybody can upload a key for you@your-company.com to a public key server.
评论 #18875489 未加载
j1vmsover 6 years ago
Nice to see more solutions like these pop up.<p>Another great one is Magic Wormhole, which uses a parallel human-to-human channel to negotiate a secure machine-to-machine exchange:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;warner&#x2F;magic-wormhole" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;warner&#x2F;magic-wormhole</a>
评论 #18876422 未加载
评论 #18876707 未加载
tyingqover 6 years ago
I can see the attraction of the automation. We happen to use a simple script that builds a self-extracting shell script. Like (passphrase is 123):<p><pre><code> #!&#x2F;bin&#x2F;sh gpg -d &lt;&lt;EOF -----BEGIN PGP MESSAGE----- jA0ECQMCnEJkjjuJ64&#x2F;j0kYB4JiTGPazY81ZOn3Ph+zRRnXdtuqB3POPizEykpiZ CT8p5SiJfXQagTLUCDpR3VCicPw4QirQoOhkLqmzRXS4EBPjkTla =+soW -----END PGP MESSAGE----- EOF </code></pre> Then the receiver doesn&#x27;t have to remember any commands.
eterpsover 6 years ago
How does this compare to keybase?
评论 #18875763 未加载
评论 #18874927 未加载
评论 #18874509 未加载
huhtenbergover 6 years ago
Nicely done. One nitpick would be that initial peer key discovery looks a bit iffy. Do I understand correctly that fk fetches it from a key registry that is hosted by you?<p>Is a self-hosted version of the same possible?<p>Additionally, there should probably be<p>a) Some sort of &quot;paranoid&quot; mode whereby it would show me peer&#x27;s key (in some form) so that I could, if really wanted, manually verify it.<p>b) An option to cache peer keys locally. I assume this is done already and that the local cache lookup is given a priority over the registry search. Correct?
评论 #18875935 未加载
lixtraover 6 years ago
Do the messages automatically get wiped? Typically you don&#x27;t want to keep the keys in your message boxes in case they get hacked in the future.<p>For this reason I use something like read then burn[1,2] for passwords.<p>[1] <a href="https:&#x2F;&#x2F;readthenburn.fnkr.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;readthenburn.fnkr.net&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;github.com&#x2F;Tethik&#x2F;burn-after-reading" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;Tethik&#x2F;burn-after-reading</a>
评论 #18875504 未加载
jen729wover 6 years ago
Setup is nice ... just sent a message to the Squirrel. ;-)<p>Don&#x27;t have much time now but just wanted to give this a quick +1, worth checking out.
评论 #18875519 未加载
jedisct1over 6 years ago
Or use Piknik: <a href="https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;piknik" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;piknik</a>
mkageniusover 6 years ago
On a side note, PSA: do not commit your AWS keys into github. Also, now you have the ability to make your repos private. Head over and do it now.
评论 #18875982 未加载
评论 #18876149 未加载