Hacker Newsnew | past | comments | ask | show | jobs | submit | holyknight's commentslogin

That's the best test of time

Hi thanks!! You can find more details about the security in the SECURITY.md https://github.com/fjrevoredo/mini-diarium/blob/master/SECUR...

Regarding Tauri, I liked it a lot. This is my first time using it for any serious project.


You certainly can, this is just a different flavor of solving a problem that can be solved in multiple ways.

yeah, that's the whole point! :D

thanks for the feedback, i think i will loop the gif. I was more focused on making it as small as possible to be fast and i forgot about the looping.

Definitely a niche thing. Thanks for the feedback

Thanks for the feedback. This is why I built it FOSS.

On the libraries: Mini Diarium actually does use established, widely audited crates rather than rolling its own primitives. See https://github.com/RustCrypto/AEADs for AES-256-GCM, https://github.com/RustCrypto/password-hashes for key derivation, and https://github.com/dalek-cryptography/curve25519-dalek + https://github.com/RustCrypto/KDFs for the key file ECIES scheme. The thin cipher.rs wrapper just handles nonce prepending with no custom crypto primitives.

On key reuse: the master key is intentionally shared across entries (as in Signal, 1Password, etc.), but each encrypt() call generates a fresh 96-bit nonce from the OS CSPRNG, so the (key, nonce) pair is never repeated.

That said, I am not a security expert by any means. If you've spotted something concrete, a specific call site, a protocol flaw, or a library you'd swap in, I'd genuinely love to hear it. Open to PRs or a discussion issue.

Regards


you can certainly do that, indeed.

I also, myself, had a similar setup some time ago; that's super valid.

It's based on a latin word so it should be not that far from the english pronunciation. It would be something like MIN-ee Dee-AIR-ee-um

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: