I will go to the Rust Los Angeles meetup event in Santa Monica tomorrow (Wed) evening: www.meetup.com/rust-los-ang...
27.01.2026 19:21 β π 0 π 0 π¬ 0 π 0@briansmith.bsky.social
https://briansmith.org
I will go to the Rust Los Angeles meetup event in Santa Monica tomorrow (Wed) evening: www.meetup.com/rust-los-ang...
27.01.2026 19:21 β π 0 π 0 π¬ 0 π 0little reason for it in most FFI either since the stronger types can be used in FFI.
01.10.2025 15:49 β π 1 π 0 π¬ 1 π 0I donβt remember. I thought it did. But even if not, f(β¦).into()? Isnβt much worse than f(β¦)?.
11.08.2025 13:29 β π 4 π 0 π¬ 0 π 0When your FFI functions return a c_int status, you can instead have them return #[repr(transparent)] struct Res(c_int); and then impl From<Res> for Result<(), Error>. This works in stable Rust today.
11.08.2025 05:26 β π 2 π 0 π¬ 1 π 0New blog post! π° I tried "vibe coding" in VSCode using GitHub Copilot (Claude Sonnet) to build an MCP proxy tool in Rust β I didn't touch a line of code, just pure agent mode magic π§ββοΈ ππ awakecoding.com/posts/vibe-c...
29.07.2025 20:22 β π 1 π 2 π¬ 0 π 0In NIST DRBGs, the potentially-attacker-controlled βmβ is the βadditional infoβ (sp? from memory). Look at how they do it. There seem to be optimized ways of doing it, mostly by using simpler keyed constructs (HMAC, HKDF). And some do other ways, also involving a random component.
11.07.2025 18:52 β π 0 π 0 π¬ 1 π 0This sketch of rejection sampling seems like a strawman with the overly simplistic H(ctr||M) construct. Many implementations do rejection sampling without the leakage you mention, by using more sophisticated constructs. The wording misleadingly, dangerously, implies the bad one is the only one. HTH.
11.07.2025 07:11 β π 2 π 0 π¬ 1 π 0It wonβt stop all new lints from firing though, just the ones where the suggestions require newer features. if you donβt want CI to fail on the day a new stable Rust is released, more work is needed.
26.06.2025 15:43 β π 3 π 0 π¬ 2 π 0clippy.toml gives you a way to set the MSRV for clippy lints separately from the MSRV of your crate, right?
26.06.2025 06:04 β π 1 π 0 π¬ 1 π 0Make sure your forum wasnβt hacked to serve different content to people who arenβt logged in and/or who arenβt admins and/or from different IPs than what admins typically use.
19.06.2025 19:11 β π 1 π 0 π¬ 0 π 0Your issuance numbers probably should be adjusted for lifetime. three consecutive 90-day certificates are equivalent to one 270-day certificate, for example.
17.06.2025 12:59 β π 1 π 0 π¬ 0 π 0This is what I've been driving for the past year! It's an exciting time, with Rust making its way into one of the most critical pieces of software: the core crypto library used in Azure and Windows. With Rust, formal verification becomes easier, and so far, no blockers to Rust adoption.
10.06.2025 17:29 β π 66 π 14 π¬ 6 π 2If you refuse to give permission to Parallels to abuse the accessibility features to automate the installation of the update, it will fail to install it (stating the obvious?). But if you go to the macOS developer downloads page, download that system update, and install it manually, it works.
10.06.2025 02:56 β π 0 π 0 π¬ 1 π 0Tried macOS 26 beta in a VM. I like the glass effect. The default icons in dark mode are like the ones on iPhone, but the clear icons look good.
It seems like a stepping stone toward touchscreen Macs. Lots of big UI elements & more of an emphasis on interactivity. Needs refinement of the layering.
As a software developer, I find many aspects of the appβs design to be amazing. Itβs actually one the best-designed apps Iβve ever used, especially in sports. Some clunky parts, but overall it is really impressive. Itβs been working extremely reliably for me, which is amazing on its own.
05.06.2025 03:56 β π 0 π 0 π¬ 1 π 0Abstract. We present an effective methodology for the formal verification of practical cryptographic protocol implementations written in Rust. Within a single proof framework, we show how to develop machine-checked proofs of diverse properties like runtime safety, parsing correctness, and cryptographic protocol security. All analysis tasks are driven by the software developer who writes annotations in the Rust source code and chooses a backend prover for each task, ranging from a generic proof assistant like Fβ to dedicated crypto-oriented provers like ProVerif and SSProve Our main contribution is a demonstration of this methodology on Bert13, a portable, post-quantum implementation of TLS 1.3 written in Rust and verified both for security and functional correctness. To our knowledge, this is the first security verification result for a protocol implementation written in Rust, and the first verified post-quantum TLS 1.3 library.
Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust (Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters) ia.cr/2025/980
02.06.2025 02:52 β π 10 π 6 π¬ 1 π 0I am watching a lot of baseball. Too much.
29.05.2025 07:21 β π 1 π 0 π¬ 0 π 0@watchmarquee.bsky.social @mlb.com Would love to get the Cubs games in 5.1 audio through MLB.TV.
10.05.2025 01:40 β π 0 π 0 π¬ 0 π 0It seems to be required by the design of core::atomics, like you point out. Presumably it could be upstreamed into libcore proper as well, though I suspect there are some knobs to tweak it that libcore wouldnβt like to expose. Definitely not an easy situation to deal with.
28.03.2025 03:09 β π 2 π 0 π¬ 0 π 0I mean, this needs a new target spec with a new implementation of core sync atomic, right?
28.03.2025 02:29 β π 1 π 0 π¬ 1 π 0Canβt you implement atomics by checking the address of the atomic and using a lock stored in coherent memory that guards some kind of (expensive, slow) coherence protocol built on top of the lock?
28.03.2025 00:08 β π 1 π 0 π¬ 1 π 0Doesnβt that mean that malloc must avoid allocating from PSRAM, or the target much claim no atomics?
27.03.2025 23:48 β π 1 π 0 π¬ 1 π 0It would have been exactly the same as Chrome, except slower to market. That was the problem, and still is the problem with Firefox today.
26.03.2025 15:36 β π 3 π 0 π¬ 0 π 0I wasnβt involved in the decision making. I did seem to be the one who informed decision makers for the first time that the sandbox would still be needed. I remember that very clearly because the surprisedβand, it seemed, doomedβlook on peopleβs faces surprised me.
26.03.2025 15:31 β π 3 π 0 π¬ 0 π 0Very early on I think memory safety was seen as a lighter-weight substitute for sandboxing. This was before we realized Servo would have so much legacy code in it, and it was before Spectre/Meltdown made it clear it was impossible even without legacy code. (Not sure what the plan was for the JIT.)
26.03.2025 15:20 β π 3 π 0 π¬ 1 π 0I simply disable the cancel button so I donβt have to worry about it.
20.03.2025 21:43 β π 0 π 0 π¬ 0 π 0It seems like you could make it fail to link in non-text scenarios by having tests link to a library that provides a symbol that it depends on.
17.03.2025 14:24 β π 0 π 0 π¬ 0 π 0Itβs the time of year where we re-read ComodoHackerβs pastebin. Props to pastebin.com for keeping this up for all these years. pastebin.com/u/ComodoHacker
06.03.2025 05:37 β π 1 π 1 π¬ 0 π 0Probably for 90%+ it could be like that, regardless of AI. But thereβs no way to tell how long the rest will take to get it βperfect enough,β nor to exactly meet the customerβs unknown expectations. Just like weβd expect a decision about programming language syntax to go.
27.02.2025 15:36 β π 1 π 0 π¬ 0 π 0It would be awesome to have neon there. It is a target feature, but only on nightly, for 32-bit.
24.02.2025 12:47 β π 1 π 0 π¬ 1 π 0