TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Temp.pw

14 点作者 ca98am79大约 1 个月前

13 条评论

TimTheTinker大约 1 个月前
This is so, utterly, unspeakably, NOT a good idea to use.<p>You&#x27;re trusting a third-party server with the plaintext of an <i>actual secret</i>. This violates nearly every principle of good modern security.<p>If the author had somehow built and documented (and proved) a true zero-trust model that enables this kind of interaction, then that might be cool. But that is not this. For all we know, the author (or an insider threat working at AWS) is collecting these passwords into a database for crackers to try first before proceeding to cracking password hashes.<p>There are so many other ways to do this. E2E encrypted messaging with disappearing messages (Signal) is the bare minimum. Keybase messages (also E2EE) are also a semi-decent option. 1Password password sharing is a decent usability step up from those. For all three of these options, barring a compromise of the (carefully guarded) process for shipping frontend code to users, the security design guarantees no visibility to a third party, and they have white papers that go into great depth to explain why.
评论 #43660007 未加载
评论 #43647579 未加载
评论 #43645124 未加载
ziddoap大约 1 个月前
This is pretty light on features and details.<p>When the use case comes up, I like to use <a href="https:&#x2F;&#x2F;github.com&#x2F;pglombardo&#x2F;PasswordPusher">https:&#x2F;&#x2F;github.com&#x2F;pglombardo&#x2F;PasswordPusher</a> (online version here <a href="https:&#x2F;&#x2F;pwpush.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pwpush.com&#x2F;</a>). Which has generation, customizable # of visits, and a handful of other features.
评论 #43644812 未加载
a3w大约 1 个月前
Why is the Share button greyed out, but clickable? Did you vibe code this? (Those are two distinct questions, but yes, I was low-balling the effort that went into this web app.)
评论 #43644845 未加载
dgrin91大约 1 个月前
A fun side project I guess, but I would never trust this for anything. Why would I use this instead of an actual password manager that has password sharing functionality? That also would not save a pw in chat history and has the added benefits on real security and not being some random site.
评论 #43645117 未加载
yawndex大约 1 个月前
Why does the &quot;share&quot; button upload the password to your server in plaintext?
评论 #43644672 未加载
评论 #43644748 未加载
esafak大约 1 个月前
I just use my password manager.<p><a href="https:&#x2F;&#x2F;support.1password.com&#x2F;share-items&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.1password.com&#x2F;share-items&#x2F;</a>
Minor49er大约 1 个月前
This generates a random password that can be shared via a one-time link. Why? What is the situation where this would be used?
评论 #43643981 未加载
thom大约 1 个月前
Nice try, Satan.
motohagiography大约 1 个月前
solves a common problem. assuming there&#x27;s a real crng generating them, the links expire in a short window, they aren&#x27;t logged, and the hashes aren&#x27;t computed for a commercial rainbow table, what are the specific security objections to this?<p>its like a vault secret without the authn friction.
new_user_final大约 1 个月前
Feedback: Input box gives zero clue that it is editable. Share button looks disabled button.
qntmfred大约 1 个月前
nice work. i&#x27;ve used <a href="https:&#x2F;&#x2F;onetimesecret.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;onetimesecret.com&#x2F;</a> for this kind of thing for several years
eigenvalue大约 1 个月前
Honeypot?
评论 #43644006 未加载
评论 #43644502 未加载
matrixhelix大约 1 个月前
openssl rand -base64 12