66
6
Notes on building end-to-end encrypted and CRDT-based local-first applications (kerkour.com)
5
You probably shouldn't block AI bots from your website (kerkour.com)
4
Rust is eating the world: From firmware to cross-platform applications, servers (kerkour.com)
1
How Signal uses Rust to secure the communications of people (kerkour.com)
129
Modern Linux tools (ikrima.dev)
2
Hosting a website with unlimited bandwidth and automatic HTTPS for 3 € / month (kerkour.com)
5
Building a Plugin System for Rust: Native Libs vs. Scripting Language vs. WASM (kerkour.com)
10
Lessons learned from implementing SIMD-accelerated algorithms in pure Rust (kerkour.com)
3
Signal Protocol Explained #2: Implementing the Double Ratchet Algorithm in Rust (kerkour.com)
2
The Signal Protocol Explained #1: Implementing the PQXDH Protocol in Rust (kerkour.com)
5
Rust is a great fit for the agentic era (kerkour.com)
3
Introduction to embedded development with Rust: Overview of the ecosystem (kerkour.com)
1
How to securely encrypt your secrets with envelope encryption and KMS in Rust (kerkour.com)
2
How to implement cryptographically-secure API keys (in Rust) (kerkour.com)
3
Designing and implementing cryptographically-secure API keys in Rust (kerkour.com)
2
A 10x faster batch job by batching PostgreSQL inserts/updates with Rust (kerkour.com)
7
SHA-3 Explained: Sponge Functions, Keccak, Shake and KangarooTwelve in Details (kerkour.com)
95
Comparing AWS S3 with Cloudflare R2: Price, Performance and User Experience (kerkour.com)
3
Toward safe and modern cryptography: Overview of the Rust ecosystem in 2024 (kerkour.com)
1
It's time to abolish the builder pattern (kerkour.com)
3
Backdooring Rust crates for fun and profit (2021) (kerkour.com)
4
How can Rust be so fast in the TechEmpower Web Framework Benchmarks? (kerkour.com)
3
JSON Web Tokens are actually great, just not for sessions (kerkour.com)
99
Why cloud bandwidth is so obscenely expensive and what you can do about that (kerkour.com)
3
What are Autonomous Systems and why they matter (a lot) for your security (kerkour.com)
5
Google's Dominance over the Internet, Visualized (bloomberg.com)
1
The Beauty and Tragedy of More (rohitsasvehalli.bearblog.dev)
62
Libsodium: A modern, portable, easy to use crypto library (github.com/jedisct1)
122
How I stay reasonably anonymous online (2022) (tmp.bearblog.dev)
51
Domain Registrars Which Developers Recommend (pragmaticengineer.com)
5
Nobody cares about the metaverse. Neurotechnology is the big deal of AR headsets (kerkour.com)
3
Clean and Scalable Architecture for Web Applications in Rust (kerkour.com)
34
Breaking SHA256: length extension attacks in practice (kerkour.com)
2
Security Issue in JWT Secret Poisoning (paloaltonetworks.com)
7
Announcing the first SHA-1 collision (googleblog.com)
2
Photoshop’s generative AI tool turned my vacation photos into nightmare fuel (theverge.com)
1
Fast hashing, it's not that simple (kerkour.com)
34
Securely Erasing Your iPhone or iPad with a Power Drill (theintercept.com)
6