unsolved73
- Karma
- 269
- Created
- 2 years ago
Recent Submissions
- 1. ▲ SHA-3 Explained: Deep Dive into Keccak, the Sponge Construction and TurboSHAKE (kerkour.com)
- 2. ▲ Deep dive into Turso, the “SQLite rewrite in Rust” (kerkour.com)
- 3. ▲ The State of Rust Cryptography in 2026 (kerkour.com)
- 4. ▲ Let's Fucking Encrypt Everything (kerkour.com)
- 5. ▲ Smartphones Are Black Holes (kerkour.com)
- 6. ▲ Notes on building end-to-end encrypted and CRDT-based local-first applications (kerkour.com)
- 7. ▲ Choosing a hash function for 2030 and beyond: SHA-2 vs. SHA-3 vs. BLAKE3 (kerkour.com)
- 8. ▲ How Cloudflare uses Rust to serve (and break) millions of websites (kerkour.com)
- 9. ▲ VCPUs in the cloud: x86 vs. ARM (aarch64) (kerkour.com)
- 10. ▲ Choosing Between PostgreSQL and SQLite (kerkour.com)