Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Using Rust and Postgres for everything: patterns learned over the years
(
kerkour.com
)
4 points
by
olalonde
2 days ago
|
past
|
discuss
Using Rust and Postgres for everything: patterns learned over the years
(
kerkour.com
)
1 point
by
enz
4 days ago
|
past
|
discuss
Is NIST's Cryptography Backdoored?
(
kerkour.com
)
5 points
by
randomint64
14 days ago
|
past
|
3 comments
Writing Against the Global Lobotomy
(
kerkour.com
)
3 points
by
randomint64
15 days ago
|
past
Deploying Rust to Production Checklist
(
kerkour.com
)
2 points
by
randomint64
17 days ago
|
past
|
1 comment
Deploying Rust to Production Checklist
(
kerkour.com
)
4 points
by
randomint64
26 days ago
|
past
Bugs that the Rust compiler catches for you
(
kerkour.com
)
3 points
by
redcannon218
33 days ago
|
past
SHA-3 Explained: Deep Dive into Keccak, the Sponge Construction and TurboSHAKE
(
kerkour.com
)
1 point
by
unsolved73
33 days ago
|
past
Breaking SHA-256: length extension attacks in practice
(
kerkour.com
)
2 points
by
randomint64
34 days ago
|
past
|
1 comment
Deep dive into Turso, the “SQLite rewrite in Rust”
(
kerkour.com
)
192 points
by
unsolved73
39 days ago
|
past
|
145 comments
The State of Rust Cryptography in 2026
(
kerkour.com
)
5 points
by
unsolved73
49 days ago
|
past
SIMD programming in pure Rust
(
kerkour.com
)
107 points
by
randomint64
49 days ago
|
past
|
56 comments
Let's Fucking Encrypt Everything
(
kerkour.com
)
3 points
by
unsolved73
52 days ago
|
past
|
1 comment
The State of Rust Cryptography in 2026
(
kerkour.com
)
3 points
by
todsacerdoti
52 days ago
|
past
ChaCha12-BLAKE3 is now ChaCha20-BLAKE3 and is stable and production-ready
(
kerkour.com
)
3 points
by
enz
52 days ago
|
past
SIMD Programming in Pure Rust
(
kerkour.com
)
5 points
by
randomint64
53 days ago
|
past
So, you want to serialize a B-Tree?
(
kerkour.com
)
2 points
by
redcannon218
59 days ago
|
past
Introduction to SIMD programming in pure Rust
(
kerkour.com
)
2 points
by
randomint64
61 days ago
|
past
Smartphones Are Black Holes
(
kerkour.com
)
3 points
by
unsolved73
76 days ago
|
past
(Social) media manipulation in one image
(
kerkour.com
)
51 points
by
randomint64
77 days ago
|
past
|
52 comments
Notes on building CRDT-based local-first and end-to-end encrypted applications
(
kerkour.com
)
3 points
by
Keyb0ardWarri0r
81 days ago
|
past
Notes on building end-to-end encrypted and CRDT-based local-first applications
(
kerkour.com
)
5 points
by
unsolved73
3 months ago
|
past
Notes on building end-to-end encrypted and CRDT-based local-first applications
(
kerkour.com
)
6 points
by
randomint64
3 months ago
|
past
You probably shouldn't block AI bots from your website
(
kerkour.com
)
5 points
by
randomint64
3 months ago
|
past
|
2 comments
Choosing a hash function for 2030 and beyond: SHA-2 vs. SHA-3 vs. BLAKE3
(
kerkour.com
)
26 points
by
unsolved73
3 months ago
|
past
|
19 comments
How Cloudflare uses Rust to serve (and break) millions of websites
(
kerkour.com
)
4 points
by
unsolved73
3 months ago
|
past
Rust is eating the world: From firmware to cross-platform applications, servers
(
kerkour.com
)
4 points
by
randomint64
4 months ago
|
past
|
1 comment
How Signal uses Rust to secure the communications of people
(
kerkour.com
)
2 points
by
randomint64
4 months ago
|
past
Cleanup your lifetime annotations in Rust with RC and Arc
(
kerkour.com
)
1 point
by
enz
4 months ago
|
past
VCPUs in the cloud: x86 vs. ARM (aarch64)
(
kerkour.com
)
3 points
by
unsolved73
4 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: