Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I assume they mean a system that uses existing crypto algorithms, rather than building everything completely from scratch. For example, if the system involves a key exchange, followed by the derivation of a shared secret, followed by symmetric encryption, all of these steps could use existing solutions with multiple available implementations (DH+AES, or perhaps X25519+ChaCha20). Wiring existing algorithms together to form a secure protocol is certainly doable by a competent programmer in a weekend. And in the Gopher spirit, if you really want to implement ChaCha20 yourself, that's much more tractable than implementing all of TLS.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: