1SHA-3 Explained: Deep Dive into Keccak, the Sponge Construction and TurboSHAKE (opens in new tab)(kerkour.com)1unsolved731mo ago0
2Deep dive into Turso, the “SQLite rewrite in Rust” (opens in new tab)(kerkour.com)192unsolved731mo ago145
6Notes on building end-to-end encrypted and CRDT-based local-first applications (opens in new tab)(kerkour.com)5unsolved733mo ago0
7Choosing a hash function for 2030 and beyond: SHA-2 vs. SHA-3 vs. BLAKE3 (opens in new tab)(kerkour.com)26unsolved734mo ago19
8How Cloudflare uses Rust to serve (and break) millions of websites (opens in new tab)(kerkour.com)4unsolved734mo ago0
11Lessons learned from implementing SIMD-accelerated algorithms in pure Rust (opens in new tab)(kerkour.com)2unsolved737mo ago0
12Introduction to embedded development with Rust: Overview of the ecosystem (opens in new tab)(kerkour.com)2unsolved739mo ago0
13Markdown Ninja: markdown-first CMS for bloggers, minimalists and startups. (opens in new tab)(github.com)42unsolved739mo ago9
14Apple ordered to pay $502M to a patent troll by UK courts (opens in new tab)(engadget.com)2unsolved7310mo ago0
15Show HN: YTS – Search YouTube from the CLI and watch videos in mpv (opens in new tab)(gitlab.com)3unsolved730y ago0