Not

Hacker News!

Beta
Home
Jobs
Q&A
Startups
Trends
Users
Live
AI companion for Hacker News

Not

Hacker News!

Beta
Home
Jobs
Q&A
Startups
Trends
Users
Live
AI companion for Hacker News
  1. Home
  2. /Story
  3. /Show HN: EphemeralNet – Secure C++ P2P infrastructure for hostile networks
  1. Home
  2. /Story
  3. /Show HN: EphemeralNet – Secure C++ P2P infrastructure for hostile networks
Nov 24, 2025 at 4:48 AM EST

Show HN: EphemeralNet – Secure C++ P2P infrastructure for hostile networks

cpp_enjoyer
1 points
1 comments

Mood

informative

Sentiment

positive

Category

startup_launch

Key topics

P2p

Security

C++

Networking

Discussion Activity

Light discussion

First comment

27s

Peak period

2

Hour 1

Avg / period

2

Comment distribution2 data points
Loading chart...

Based on 2 loaded comments

Key moments

  1. 01Story posted

    Nov 24, 2025 at 4:48 AM EST

    4h ago

    Step 01
  2. 02First comment

    Nov 24, 2025 at 4:48 AM EST

    27s after posting

    Step 02
  3. 03Peak activity

    2 comments in Hour 1

    Hottest window of the conversation

    Step 03
  4. 04Latest activity

    Nov 24, 2025 at 5:08 AM EST

    4h ago

    Step 04

Generating AI Summary...

Analyzing up to 500 comments to identify key contributors and discussion patterns

Discussion (1 comments)
Showing 2 comments
cpp_enjoyer
4h ago
Hi HN, OP here. I’m the creator of EphemeralNet.

I built this because I wanted to tackle two deeply annoying problems in distributed systems simultaneously: getting P2P traffic through aggressive corporate firewalls/CGNATs reliably, and guaranteeing that shared data actually expires across a mesh without central coordination.

It’s a standalone infrastructure daemon written from scratch in C++20 (no Boost, minimal dependencies).

Some technical details for those interested:

The NAT Problem: It uses standard STUN, but falls back to a custom, high-performance asynchronous relay server I built using Linux epoll and macOS kqueue edge-triggered notification. It’s designed to handle high-throughput spikes efficiently.

The Expiration Problem: It implements a modified Kademlia DHT where TTL (Time-To-Live) is a first-class constraint enforced cryptographically across the network. Nodes actively reject and purge expired records.

Security: Handshake involves a proof-of-work puzzle to mitigate Sybil attacks. Transport is encrypted using ChaCha20-Poly1305 with rotating session keys.

It’s currently v1.0.0. The docs and architecture diagram are at the link. I’d love to hear your feedback on the design choices, especially around the relay architecture.

Thanks!

cpp_enjoyer
4h ago
Just to add a bit of context on the relay part: I went down a rabbit hole trying to decide between using something existing like coturn or building my own.

The decision to build a custom one using edge-triggered epoll was driven by the need to handle many short-lived connections efficiently without the overhead of a full STUN/TURN stack for every single handshake. I'm curious if anyone here has experience scaling similar custom relay architectures in production.

View full discussion on Hacker News
ID: 46032203Type: storyLast synced: 11/24/2025, 9:56:09 AM

Want the full context?

Jump to the original sources

Read the primary article or dive into the live Hacker News thread when you're ready.

Read ArticleView on HN

Not

Hacker News!

AI-observed conversations & context

Daily AI-observed summaries, trends, and audience signals pulled from Hacker News so you can see the conversation before it hits your feed.

LiveBeta

Explore

  • Home
  • Jobs radar
  • Tech pulse
  • Startups
  • Trends

Resources

  • Visit Hacker News
  • HN API
  • Modal cronjobs
  • Meta Llama

Briefings

Inbox recaps on the loudest debates & under-the-radar launches.

Connect

© 2025 Not Hacker News! — independent Hacker News companion.

Not affiliated with Hacker News or Y Combinator. We simply enrich the public API with analytics.