Brian Smith's Avatar

Brian Smith

@briansmith.bsky.social

https://briansmith.org

872 Followers  |  116 Following  |  64 Posts  |  Joined: 29.07.2023  |  1.9494

Latest posts by briansmith.bsky.social on Bluesky

Preview
Rust Los Angeles: Building Git-LFS Replacements in Rust, Wed, Jan 28, 2026, 6:00 PM | Meetup The Rust ecosystem is exploding right now! New tools, use cases, and companies adopting it at scale. With so many interested in staying up-to-date on these trends, we figur

I will go to the Rust Los Angeles meetup event in Santa Monica tomorrow (Wed) evening: www.meetup.com/rust-los-ang...

27.01.2026 19:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

little reason for it in most FFI either since the stronger types can be used in FFI.

01.10.2025 15:49 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I don’t remember. I thought it did. But even if not, f(…).into()? Isn’t much worse than f(…)?.

11.08.2025 13:29 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

When your FFI functions return a c_int status, you can instead have them return #[repr(transparent)] struct Res(c_int); and then impl From<Res> for Result<(), Error>. This works in stable Rust today.

11.08.2025 05:26 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Vibe coding a Rust MCP proxy in VSCode with GitHub Copilot A hands-off experiment building a Rust-based Model Context Protocol (MCP) proxy tool using only GitHub Copilot agent mode. Covers setup, multi-transport support, and lessons learned from letting Copil...

New blog post! πŸ“° I tried "vibe coding" in VSCode using GitHub Copilot (Claude Sonnet) to build an MCP proxy tool in Rust β€” I didn't touch a line of code, just pure agent mode magic πŸ§™β€β™‚οΈ πŸš€πŸ‘‡ awakecoding.com/posts/vibe-c...

29.07.2025 20:22 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

In NIST DRBGs, the potentially-attacker-controlled β€œm” is the β€œadditional info” (sp? from memory). Look at how they do it. There seem to be optimized ways of doing it, mostly by using simpler keyed constructs (HMAC, HKDF). And some do other ways, also involving a random component.

11.07.2025 18:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

This sketch of rejection sampling seems like a strawman with the overly simplistic H(ctr||M) construct. Many implementations do rejection sampling without the leakage you mention, by using more sophisticated constructs. The wording misleadingly, dangerously, implies the bad one is the only one. HTH.

11.07.2025 07:11 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

It won’t stop all new lints from firing though, just the ones where the suggestions require newer features. if you don’t want CI to fail on the day a new stable Rust is released, more work is needed.

26.06.2025 15:43 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

clippy.toml gives you a way to set the MSRV for clippy lints separately from the MSRV of your crate, right?

26.06.2025 06:04 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Make sure your forum wasn’t hacked to serve different content to people who aren’t logged in and/or who aren’t admins and/or from different IPs than what admins typically use.

19.06.2025 19:11 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Your issuance numbers probably should be adjusted for lifetime. three consecutive 90-day certificates are equivalent to one 270-day certificate, for example.

17.06.2025 12:59 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

This is what I've been driving for the past year! It's an exciting time, with Rust making its way into one of the most critical pieces of software: the core crypto library used in Azure and Windows. With Rust, formal verification becomes easier, and so far, no blockers to Rust adoption.

10.06.2025 17:29 β€” πŸ‘ 66    πŸ” 14    πŸ’¬ 6    πŸ“Œ 2

If you refuse to give permission to Parallels to abuse the accessibility features to automate the installation of the update, it will fail to install it (stating the obvious?). But if you go to the macOS developer downloads page, download that system update, and install it manually, it works.

10.06.2025 02:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Tried macOS 26 beta in a VM. I like the glass effect. The default icons in dark mode are like the ones on iPhone, but the clear icons look good.

It seems like a stepping stone toward touchscreen Macs. Lots of big UI elements & more of an emphasis on interactivity. Needs refinement of the layering.

10.06.2025 02:46 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

As a software developer, I find many aspects of the app’s design to be amazing. It’s actually one the best-designed apps I’ve ever used, especially in sports. Some clunky parts, but overall it is really impressive. It’s been working extremely reliably for me, which is amazing on its own.

05.06.2025 03:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Abstract. We present an effective methodology for the formal verification of practical cryptographic protocol implementations written in Rust. Within a single proof framework, we show how to develop machine-checked proofs of diverse properties like runtime safety, parsing correctness, and cryptographic protocol security. All analysis tasks are driven by the software developer who writes annotations in the Rust source code and chooses a backend prover for each task, ranging from a generic proof assistant like F⋆ to dedicated crypto-oriented provers like ProVerif and SSProve Our main contribution is a demonstration of this methodology on Bert13, a portable, post-quantum implementation of TLS 1.3 written in Rust and verified both for security and functional correctness. To our knowledge, this is the first security verification result for a protocol implementation written in Rust, and the first verified post-quantum TLS 1.3 library.

Abstract. We present an effective methodology for the formal verification of practical cryptographic protocol implementations written in Rust. Within a single proof framework, we show how to develop machine-checked proofs of diverse properties like runtime safety, parsing correctness, and cryptographic protocol security. All analysis tasks are driven by the software developer who writes annotations in the Rust source code and chooses a backend prover for each task, ranging from a generic proof assistant like F⋆ to dedicated crypto-oriented provers like ProVerif and SSProve Our main contribution is a demonstration of this methodology on Bert13, a portable, post-quantum implementation of TLS 1.3 written in Rust and verified both for security and functional correctness. To our knowledge, this is the first security verification result for a protocol implementation written in Rust, and the first verified post-quantum TLS 1.3 library.

Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust (Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters) ia.cr/2025/980

02.06.2025 02:52 β€” πŸ‘ 10    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0

I am watching a lot of baseball. Too much.

29.05.2025 07:21 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@watchmarquee.bsky.social @mlb.com Would love to get the Cubs games in 5.1 audio through MLB.TV.

10.05.2025 01:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It seems to be required by the design of core::atomics, like you point out. Presumably it could be upstreamed into libcore proper as well, though I suspect there are some knobs to tweak it that libcore wouldn’t like to expose. Definitely not an easy situation to deal with.

28.03.2025 03:09 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I mean, this needs a new target spec with a new implementation of core sync atomic, right?

28.03.2025 02:29 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Can’t you implement atomics by checking the address of the atomic and using a lock stored in coherent memory that guards some kind of (expensive, slow) coherence protocol built on top of the lock?

28.03.2025 00:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Doesn’t that mean that malloc must avoid allocating from PSRAM, or the target much claim no atomics?

27.03.2025 23:48 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

It would have been exactly the same as Chrome, except slower to market. That was the problem, and still is the problem with Firefox today.

26.03.2025 15:36 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I wasn’t involved in the decision making. I did seem to be the one who informed decision makers for the first time that the sandbox would still be needed. I remember that very clearly because the surprisedβ€”and, it seemed, doomedβ€”look on people’s faces surprised me.

26.03.2025 15:31 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Very early on I think memory safety was seen as a lighter-weight substitute for sandboxing. This was before we realized Servo would have so much legacy code in it, and it was before Spectre/Meltdown made it clear it was impossible even without legacy code. (Not sure what the plan was for the JIT.)

26.03.2025 15:20 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I simply disable the cancel button so I don’t have to worry about it.

20.03.2025 21:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It seems like you could make it fail to link in non-text scenarios by having tests link to a library that provides a symbol that it depends on.

17.03.2025 14:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
ComodoHacker's Pastebin - Pastebin.com Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

It’s the time of year where we re-read ComodoHacker’s pastebin. Props to pastebin.com for keeping this up for all these years. pastebin.com/u/ComodoHacker

06.03.2025 05:37 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Probably for 90%+ it could be like that, regardless of AI. But there’s no way to tell how long the rest will take to get it β€œperfect enough,” nor to exactly meet the customer’s unknown expectations. Just like we’d expect a decision about programming language syntax to go.

27.02.2025 15:36 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It would be awesome to have neon there. It is a target feature, but only on nightly, for 32-bit.

24.02.2025 12:47 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@briansmith is following 20 prominent accounts