Hacker Newsnew | past | comments | ask | show | jobs | submit | alcazar's commentslogin

I have. It's actually quite hard to miss if you set up Signal or Telegram for the check-ins.

You can also add a friend or even yourself with another email address as the first contact to notify before it sends the final messages. This friend can ping you, and you can acknowledge before it notifies your other contacts.


https://hn.alcazarsec.com/daily

I'm also publishing a hackernews daily digest.

This story was included in the March 9th issue (https://hn.alcazarsec.com/daily?date=2026-03-09).

  Hacker News users are currently developing a diverse range of projects, from a retro-inspired city builder game [0] and an award-winning daily word puzzle [4] to a European-based search engine alternative [2] and a NSFW filter for the Marginalia search engine [8]. Several developers are focusing on practical tools for family and personal life, including an educational site to help relatives identify AI-generated content [1], a "statphone" for emergency family alerts [3], and a local-first financial tracking app using double-entry accounting [6]. Others are experimenting with advanced technical implementations, such as using LLM agents to backtest stock trading strategies [5], "vibe-coding" CLI tools, and designing a new language for bare-metal embedded devices [7].

Working on...

- Portable Secret (https://alcazarsec.github.io/portable-secret/) - self-contained HTML files that decrypt in the browser.

- Dead Man's Switch (https://alcazarsec.com/deadmanswitch) - sends messages when you stop checking in.

- Flare (https://alcazarsec.com/) - silent alert when your device is accessed without authorization.


What's the long-term support plan for dead man's switch? What happens if for example you meet an untimely fate? It seems that you will need to support storing information on a years or decades time scale right off the bat.

I ask because I was recently thinking about how to preserve information for the future like this


If we were to die as a company (unlikely), we would reach out to customers well in advance (think >1 year) and ask them to download their data so they could migrate to another provider.

This seems unlikely, however, since our infrastructure costs for the dead man's switch are covered by just a handful of subscriptions. Besides, we host it next to our other more profitable main product, so it gets free maintenance.

We are up for the challenge of making this last for many decades, though. It is a beautiful mission.


Same here. Unless a site is known for good quality, I only open articles after checking top comments. Most days I just read the daily digest of discussions - which sometimes piques my curiosity enough to check the original links.

Yeah, I'm not sure most normal people use file systems that much.

We spend ours on our laptops and assume others do too. But many people don't even own a laptop. They handle all their computing needs from their phones, using proprietary apps, with the data living in WhatsApp messages.


How do you automate hashing and verifying filenames?

I have used rhash (https://github.com/rhash/RHash) before to do something similar - but with all the hashes for a directory stored in a single file (which I can diff against past or future versions).

Backing up private data and verifying it for corruption is crucial.


Welcome to the Dead Man's Switch Founders Club. It's packed in here, but we all have fun ;)

Ha — exclusive club, but the benefits kick in when you go silent!

“There are no solutions, only trade-offs” - Thomas Sowell

We would rather err on the side of not knowing about our customers. But it’s a choice that comes with consequences.

As you mentioned, we mitigate this with:

- Multi-channel verification: We send check-in links to multiple channels at once (email, Telegram, Signal). It’s unlikely you’ll miss all of them accidentally.

- Long escalation times: You can set the grace period up to 3 months - far longer than most vacations and longer than anyone we’ve met has been away from their phone.

- Tiered escalation: We keep sending check-ins until it’s time to alert your contacts.

- Trusted contacts: You can alert a friend earlier than family, and they can warn you that messages are about to go out.

Thank you for checking us out! If you’d like to discuss anything else or share more feedback, reach out: https://alcazarsec.com/contact


The multi-channel verification and tiered escalation are the way to go. that's the hard part on the trigger side.

What I keep coming back to with anonymous services is the delivery experience. Once the switch fires, what does the recipient's journey actually look like? Especially if they're non-technical (which, statistically, they probably are).

There's an interesting tension between keeping the service zero-knowledge and making the output usable by someone who's never touched a terminal.

Curious how you're thinking about that side of it.


Here we prioritize ease of use.

The only way to make a message-sending service truly zero-knowledge is to require contacts to upload a public key beforehand and encrypt every message with that key before storage in the database.

Unfortunately, this approach requires contacts to be technical people who understand encryption, keys, and key custody. When you die, you want to reach your family and friends—not only the tech-savvy ones.

So we encrypt messages at rest with a key stored separately from the database. This forces attackers to compromise two separate infrastructures (and before we notice and rotate the keys) to access any data. When sending the messages, we decrypt them in memory and deliver them in plaintext. That way, your parents don’t need a computer science degree to read your last message.

And if your threat model requires it, you can also use our Portable Secret to password-protect the documents. We provide both options.


Smart trade-off. The "two separate infrastructures" model is pragmatic — perfect security that nobody can use is no security at all.

The Portable Secret option is a nice touch for the paranoid-but-organized crowd. Do you find most users actually use it, or does the convenience of plaintext delivery win out?


Most users stick to plaintext. That's expected. Under typical threat models, convenience & ease of use outweigh perfect security.

This summary is interesting because it includes top comments. Most insights come from the discussion.

I do two separate summaries: one for the story (sometimes impossible if paywalled) and one for the comments.

AMA about technical implementation.


If you get to read this before it fades away from /new, I hope you enjoy it. I'm quite into entropy representation, and this is my best attempt at database IDs in REST APIs.

TypeID is similar, though it uses the UUIDv7 directly: https://github.com/jetify-com/typeid Maybe the formalization would be interesting to you.

It doesn't have a checksum, though, that seems like an improvement that's worth a few bytes.


Thanks! I didn't know about TypeID (and I thought I'd searched thoroughly).

The formalization interests me. Shame they shifted the UUID 2 bits right. Otherwise our implementations would be almost compatible (only the last 2 bits of the 26th character + the last 3 characters would differ). In my next clean codebase, I may use TypeID and append a 15-bit checksum.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: