DEV Community

Vincent Eckert Sierota
Vincent Eckert Sierota

Posted on

๐Ÿฆ€ Rust Weekly Log โ€” Resilience, Cryptography & Observability

This week focused on strengthening correctness, security, and production readiness across my Rust ecosystem.

๐Ÿ“ก RustPulse โ€” Hardening the ingestion pipeline

Step 2/3: Added X-CRC32 validation at ingestion to block corrupted payloads early.
Step 3/3: Introduced fault-injection simulation combined with bounded retries/backoff to validate resilience under packet loss and corruption.

Goal: prove delivery guarantees under stress, not just assume them.

Project:
https://vinecksie.super.site/rustpulse

๐Ÿ” Sealed in Rust โ€” Key Derivation Functions

Published a new chapter covering:

Why passwords are not encryption keys

How salts prevent large-scale precomputed attacks

Why Argon2id and scrypt significantly increase offline cracking costs

This chapter connects cryptographic primitives to real-world Rust usage.

Read here:
https://vinecksie.github.io/sealed-in-rust/02-core-primitives/02-06-key-derivation.html

โ–ถ๏ธ Fearless in Rust โ€” Observability Done Right

Integrated OpenTelemetry + Jaeger to get full end-to-end traces without leaking infrastructure concerns into the domain layer.

Clean architecture remains intact. Observability is externalized. Exactly how it should be.

Watch here:
https://www.youtube.com/watch?v=nGeWI18e3Y0

Top comments (1)

Collapse
 
luftietheanonymous profile image
Luftie The Anonymous

Thank you for the article. I'm quite new into cryptography. I'm coming from web-dev background. For now in case of cryptography I finished a 27 lectures course by professor Paar, though I intend to read his renewed book on cryptography covering post-quantum cryptography. Also I gonna learn Rust, so I will stay alert whenever you post something on Rust, to get perhaps some sneak peak.

Looking forward to connect :D