Articles by randomint64
66

(Social) media manipulation in one image (kerkour.com)

6

Notes on building end-to-end encrypted and CRDT-based local-first applications (kerkour.com)

5

You probably shouldn't block AI bots from your website (kerkour.com)

4

Rust is eating the world: From firmware to cross-platform applications, servers (kerkour.com)

1

How Signal uses Rust to secure the communications of people (kerkour.com)

129

Modern Linux tools (ikrima.dev)

2

Hosting a website with unlimited bandwidth and automatic HTTPS for 3 € / month (kerkour.com)

5

Building a Plugin System for Rust: Native Libs vs. Scripting Language vs. WASM (kerkour.com)

10

Lessons learned from implementing SIMD-accelerated algorithms in pure Rust (kerkour.com)

3

Signal Protocol Explained #2: Implementing the Double Ratchet Algorithm in Rust (kerkour.com)

2

The Signal Protocol Explained #1: Implementing the PQXDH Protocol in Rust (kerkour.com)

5

Rust is a great fit for the agentic era (kerkour.com)

3

Introduction to embedded development with Rust: Overview of the ecosystem (kerkour.com)

1

How to securely encrypt your secrets with envelope encryption and KMS in Rust (kerkour.com)

2

How to implement cryptographically-secure API keys (in Rust) (kerkour.com)

3

Designing and implementing cryptographically-secure API keys in Rust (kerkour.com)

2

A 10x faster batch job by batching PostgreSQL inserts/updates with Rust (kerkour.com)

7

SHA-3 Explained: Sponge Functions, Keccak, Shake and KangarooTwelve in Details (kerkour.com)

95

Comparing AWS S3 with Cloudflare R2: Price, Performance and User Experience (kerkour.com)

3

Toward safe and modern cryptography: Overview of the Rust ecosystem in 2024 (kerkour.com)

1

It's time to abolish the builder pattern (kerkour.com)

3

Backdooring Rust crates for fun and profit (2021) (kerkour.com)

4

How can Rust be so fast in the TechEmpower Web Framework Benchmarks? (kerkour.com)

3

JSON Web Tokens are actually great, just not for sessions (kerkour.com)

99

Why cloud bandwidth is so obscenely expensive and what you can do about that (kerkour.com)

3

What are Autonomous Systems and why they matter (a lot) for your security (kerkour.com)

5

Google's Dominance over the Internet, Visualized (bloomberg.com)

1

The Beauty and Tragedy of More (rohitsasvehalli.bearblog.dev)

62

Libsodium: A modern, portable, easy to use crypto library (github.com/jedisct1)

122

How I stay reasonably anonymous online (2022) (tmp.bearblog.dev)

51

Domain Registrars Which Developers Recommend (pragmaticengineer.com)

5

Nobody cares about the metaverse. Neurotechnology is the big deal of AR headsets (kerkour.com)

3

Clean and Scalable Architecture for Web Applications in Rust (kerkour.com)

34

Breaking SHA256: length extension attacks in practice (kerkour.com)

2

Security Issue in JWT Secret Poisoning (paloaltonetworks.com)

7

Announcing the first SHA-1 collision (googleblog.com)

2

Photoshop’s generative AI tool turned my vacation photos into nightmare fuel (theverge.com)

1

Fast hashing, it's not that simple (kerkour.com)

34

Securely Erasing Your iPhone or iPad with a Power Drill (theintercept.com)

6

GitHub Is Down (github.com/login)