TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: TLS 1.3 and Post-Quantum Encryption for HN?

15 pointsby Azerty99995 months ago
Could HN benefit from a TLS upgrade, as it&#x27;s currently at TLS v1.2, (not e.g.: v1.3) (for me, at least)? Also could it benefit from being a leader in implementing post-quantum cryptography?<p>Cloudflare is beginning to implement it: https:&#x2F;&#x2F;pq.cloudflareresearch.com (See cloudflare blog posts about it, too for many more details)..

3 comments

theandrewbailey5 months ago
HN doesn&#x27;t handle super-secure data, outside of email addresses and passwords (which should not be re-used elsewhere). I&#x27;m skeptical that HN would benefit much from using post-quantum crypto, over using current recommendations like <a href="https:&#x2F;&#x2F;ssl-config.mozilla.org&#x2F;#server=nginx&amp;version=1.27.3&amp;config=modern&amp;openssl=3.4.0&amp;ocsp=false&amp;guideline=5.7" rel="nofollow">https:&#x2F;&#x2F;ssl-config.mozilla.org&#x2F;#server=nginx&amp;version=1.27.3&amp;...</a><p>That said, HN could use an update in configuration (disable TLS 1.0 and 1.1 and CBC ciphers, enable TLS 1.3): <a href="https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;analyze.html?d=news.ycombinator.com&amp;s=2606%3a7100%3a1%3a67%3a0%3a0%3a0%3a26" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;analyze.html?d=news.ycombina...</a><p>I get it, new crypto algorithms are cool, but these just aren&#x27;t widely implemented in browsers or servers yet, and we&#x27;re still several years out from a quantum computer breaking 2048 bit RSA or 256 bit ECDSA.
评论 #42556176 未加载
ggm5 months ago
In my personal QC skeptic opinion, frequent recertification of the site certificate would do for now. We don&#x27;t need perfect forward secrecy and so future pqc outcomes about decoding packet captures made now seem fruitless for this context. (We don&#x27;t need pfs because afaik everything here is visible, and individual user logins aren&#x27;t based on public private cryptography. If the tls cert was rolled every day I wouldn&#x27;t care)<p>Maybe the cert issuing chain needs to be looked at for its risks but I can&#x27;t see the site certificate itself being at risk.<p>I mean I am glad cloudflare and others are showing capability but my highly broken foot gun of futurology says to me, this is a fools errand. I&#x27;ve been wrong many many times.
评论 #42555477 未加载
userbinator5 months ago
Perhaps you&#x27;re a bit too paranoid?
评论 #42555546 未加载