Better Auth, by a self-taught Ethiopian dev, raises $5M from Peak XV, YC
Product & Monetization
- Better Auth is praised as a well-designed, embeddable TypeScript/Node auth framework that runs directly against the app’s own database, rather than as an external hosted service.
- Commenters expect an open-core + cloud-hosting model: free self-hosted library, plus a paid managed service and enterprise features (e.g., SSO, infra add-ons).
- Some fear “enshittification” now that VC money is involved, anticipating critical features like enterprise SSO being locked behind expensive tiers.
Technical Approach & Comparisons
- Key selling point: no separate auth server; just your app and DB. This is compared favorably to Firebase, Auth0, Clerk, Supabase, Cognito, Ory Kratos, Keycloak, and Supertokens for single-app use cases.
- Others argue that at scale or with multiple apps, a separate identity service is beneficial for SSO, shared identity, legal separation of PII, and independent deployment.
- Lucia is explicitly noted as deprecated; some say its shutdown helped Better Auth gain adoption. OpenAuth’s status is debated (stalled vs “known dead”).
- Some users dislike that Better Auth lacks a built-in dashboard and email system; needing to wire SMTP or a mail service and build admin UIs pushes them toward “all‑in‑one” services like Auth0/Clerk. Third-party UI projects and 2FA support are mentioned as partial remedies.
- Critiques include tight coupling to Kysely and confusion about whether it’s “frontend” or “backend” focused; consensus is it’s a backend library.
How Hard Is Auth?
- Large subthread debates whether auth is “easy” or “actually really hard”:
- One side: auth is conceptually straightforward if you follow specs, don’t roll your own crypto, and use established hashing (bcrypt/argon2, proper nonces, expiry).
- Other side: real-world evidence shows many teams fail even basic OAuth/OIDC and password storage; subtle mistakes quickly expose PII or tokens.
- Distinction is made between:
- Authentication vs authorization (authZ seen as harder).
- Basic username/password vs OAuth/SSO and crypto.
- Some argue outsourcing auth (Auth0, Cognito, etc.) is safer but can become expensive, inflexible, and a form of core dependency lock‑in.
OSS, VC, and Sustainability
- Multiple commenters wrestle with OSS + VC tension: funding brings audits, longevity signals, and enterprise comfort, but also pressure for 100x returns, potential lock-in, and misalignment with community interests.
- Several lament that many users expect high-quality auth libraries yet rarely contribute financially, making VC one of the few viable paths; others prefer bootstrapping and direct sponsorships.
Self‑Taught / Ethiopian Framing
- Some are uneasy with “self-taught Ethiopian dev” in the headline, seeing it as clickbait or patronizing; others say it’s simply highlighting an underrepresented founder and the rarity of African VC-backed dev tools.
- There is an extended, mixed discussion on self-taught vs CS-degree developers: many note that most practical skills are self-taught, while others emphasize the value of formal CS for deeper understanding, especially in security domains.
Developer Experiences & Gaps
- Users report very fast integration (minutes), strong TypeScript experience, powerful plugins, and good ORM (Drizzle/Prisma) integration keeping schemas as the single source of truth.
- Some see it as “open-source Clerk without vendor lock‑in,” ideal for early-stage products that want to own their user table.
- Skeptics prefer batteries-included SaaS for side projects where time-to-market and zero-ops matter more than owning auth.