Articles by randomint64
55

The limits of Rust, or why you should probably not follow Amazon and Cloudflare (kerkour.com)

1

Like solar, Rust is inevitable (kerkour.com)

5

All databases will eventually be (re)written in Rust (kerkour.com)

1

All databases will eventually be (re)written in Rust (kerkour.com)

3

How to implement cryptographically-secure API keys (kerkour.com)

1

AI (and) Maximalism (kerkour.com)

5

Supply chain nightmare: How Rust will be attacked and how to mitigate attacks (kerkour.com)

4

Optimizing SQLite for Servers (kerkour.com)

4

Using Rust and Postgres for everything: patterns learned over the years (kerkour.com)

5

Building pentest devices with Rust and ESP32-C6 microcontrollers (kerkour.com)

5

Building pentest devices with Rust and an ESP32-C6 (kerkour.com)

2

Using Rust and Postgres for everything: patterns learned over the years (kerkour.com)

1

Overthinking (kerkour.com)

4

Is NIST's Cryptography Backdoored? (kerkour.com)

2

Writing Against the Global Lobotomy (kerkour.com)

3

Deploying Rust to Production Checklist (kerkour.com)

4

Deploying Rust to Production Checklist (kerkour.com)

2

Breaking SHA-256: length extension attacks in practice (kerkour.com)

16

SIMD programming in pure Rust (kerkour.com)

5

SIMD Programming in Pure Rust (kerkour.com)

2

Introduction to SIMD programming in pure Rust (kerkour.com)

66

(Social) media manipulation in one image (kerkour.com)

6

Notes on building end-to-end encrypted and CRDT-based local-first applications (kerkour.com)

5

You probably shouldn't block AI bots from your website (kerkour.com)

4

Rust is eating the world: From firmware to cross-platform applications, servers (kerkour.com)

1

How Signal uses Rust to secure the communications of people (kerkour.com)

129

Modern Linux tools (ikrima.dev)

2

Hosting a website with unlimited bandwidth and automatic HTTPS for 3 € / month (kerkour.com)

5

Building a Plugin System for Rust: Native Libs vs. Scripting Language vs. WASM (kerkour.com)

10

Lessons learned from implementing SIMD-accelerated algorithms in pure Rust (kerkour.com)

3

Signal Protocol Explained #2: Implementing the Double Ratchet Algorithm in Rust (kerkour.com)

2

The Signal Protocol Explained #1: Implementing the PQXDH Protocol in Rust (kerkour.com)

5

Rust is a great fit for the agentic era (kerkour.com)

3

Introduction to embedded development with Rust: Overview of the ecosystem (kerkour.com)

1

How to securely encrypt your secrets with envelope encryption and KMS in Rust (kerkour.com)

2

How to implement cryptographically-secure API keys (in Rust) (kerkour.com)

3

Designing and implementing cryptographically-secure API keys in Rust (kerkour.com)

2

A 10x faster batch job by batching PostgreSQL inserts/updates with Rust (kerkour.com)

7

SHA-3 Explained: Sponge Functions, Keccak, Shake and KangarooTwelve in Details (kerkour.com)

95

Comparing AWS S3 with Cloudflare R2: Price, Performance and User Experience (kerkour.com)

3

Toward safe and modern cryptography: Overview of the Rust ecosystem in 2024 (kerkour.com)

1

It's time to abolish the builder pattern (kerkour.com)

3

Backdooring Rust crates for fun and profit (2021) (kerkour.com)

4

How can Rust be so fast in the TechEmpower Web Framework Benchmarks? (kerkour.com)

3

JSON Web Tokens are actually great, just not for sessions (kerkour.com)

99

Why cloud bandwidth is so obscenely expensive and what you can do about that (kerkour.com)

3

What are Autonomous Systems and why they matter (a lot) for your security (kerkour.com)

5

Google's Dominance over the Internet, Visualized (bloomberg.com)

1

The Beauty and Tragedy of More (rohitsasvehalli.bearblog.dev)

62

Libsodium: A modern, portable, easy to use crypto library (github.com/jedisct1)

122

How I stay reasonably anonymous online (2022) (tmp.bearblog.dev)

51

Domain Registrars Which Developers Recommend (pragmaticengineer.com)

5

Nobody cares about the metaverse. Neurotechnology is the big deal of AR headsets (kerkour.com)

3

Clean and Scalable Architecture for Web Applications in Rust (kerkour.com)

34

Breaking SHA256: length extension attacks in practice (kerkour.com)

2

Security Issue in JWT Secret Poisoning (paloaltonetworks.com)

7

Announcing the first SHA-1 collision (googleblog.com)

2

Photoshop’s generative AI tool turned my vacation photos into nightmare fuel (theverge.com)

1

Fast hashing, it's not that simple (kerkour.com)

34

Securely Erasing Your iPhone or iPad with a Power Drill (theintercept.com)

6

GitHub Is Down (github.com/login)