TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

TermPair: Terminal sharing with AES-GCM 128 bit end-to-end encryption

118 pointsby illuminatedalmost 4 years ago

9 comments

rsj_hnalmost 4 years ago
This looks cool, but if the author is here, I wish they would actually explain the security rather than just citing AES-GCM, which doesn&#x27;t really explain the security design.<p>How is the key material established, exactly? How is it rotated? How is it protected when stored? The answers to these questions are a lot more relevant to understanding the security of this application than citing which encryption mode is being used.
评论 #27338910 未加载
评论 #27338886 未加载
评论 #27340898 未加载
pmccarrenalmost 4 years ago
for fans of tmux, I&#x27;m partial towards tmate[0], instant tmux session sharing over ssh, optionally through a relay<p>refs: [0]<a href="https:&#x2F;&#x2F;tmate.io" rel="nofollow">https:&#x2F;&#x2F;tmate.io</a>
评论 #27340495 未加载
评论 #27341263 未加载
chrissnellalmost 4 years ago
I like to use SSH and GNU screen(1) to do follow-the-leader sharing of a screen session. There&#x27;s probably a tmux equivalent.<p><a href="https:&#x2F;&#x2F;www.endpoint.com&#x2F;blog&#x2F;2009&#x2F;09&#x2F;24&#x2F;gnu-screen-follow-leader" rel="nofollow">https:&#x2F;&#x2F;www.endpoint.com&#x2F;blog&#x2F;2009&#x2F;09&#x2F;24&#x2F;gnu-screen-follow-l...</a>
solresolalmost 4 years ago
Back in my day we used to use kibitz (from the expect package)...<p><a href="https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;kibitz" rel="nofollow">https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;kibitz</a><p><a href="https:&#x2F;&#x2F;opensource.apple.com&#x2F;source&#x2F;tcl&#x2F;tcl-20&#x2F;tcl_ext&#x2F;expect&#x2F;expect&#x2F;example&#x2F;kibitz.auto.html" rel="nofollow">https:&#x2F;&#x2F;opensource.apple.com&#x2F;source&#x2F;tcl&#x2F;tcl-20&#x2F;tcl_ext&#x2F;expec...</a><p>Not bad for 415 lines of code.
xvectoralmost 4 years ago
Is it really E2EE if you could compromise the server to serve a compromised web-app? Same issue with ProtonMail.
mushufasaalmost 4 years ago
How does this compare to the feature for sharing terminals within VS Code? Is it a similar technique or totally different implementation?
评论 #27338967 未加载
ignoramousalmost 4 years ago
Project devs: Consider using CPACE (a password-authenticated key exchange) which is in the process of being standardized by IETF.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;cpace" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;cpace</a>
sam_lowry_almost 4 years ago
How is that different from screen -x?
mlang23almost 4 years ago
I realize the browser is the target audience here, but... I prefer tmux, esp. because it does <i>NOT</i> bypass local access control.