This week focused on strengthening correctness, security, and production readiness across my Rust ecosystem.
๐ก RustPulse โ Hardening the ingestion pipeline
Step 2/3: Added X-CRC32 validation at ingestion to block corrupted payloads early.
Step 3/3: Introduced fault-injection simulation combined with bounded retries/backoff to validate resilience under packet loss and corruption.
Goal: prove delivery guarantees under stress, not just assume them.
Project:
https://vinecksie.super.site/rustpulse
๐ Sealed in Rust โ Key Derivation Functions
Published a new chapter covering:
Why passwords are not encryption keys
How salts prevent large-scale precomputed attacks
Why Argon2id and scrypt significantly increase offline cracking costs
This chapter connects cryptographic primitives to real-world Rust usage.
Read here:
https://vinecksie.github.io/sealed-in-rust/02-core-primitives/02-06-key-derivation.html
โถ๏ธ Fearless in Rust โ Observability Done Right
Integrated OpenTelemetry + Jaeger to get full end-to-end traces without leaking infrastructure concerns into the domain layer.
Clean architecture remains intact. Observability is externalized. Exactly how it should be.
Watch here:
https://www.youtube.com/watch?v=nGeWI18e3Y0
Top comments (1)
Thank you for the article. I'm quite new into cryptography. I'm coming from web-dev background. For now in case of cryptography I finished a 27 lectures course by professor Paar, though I intend to read his renewed book on cryptography covering post-quantum cryptography. Also I gonna learn Rust, so I will stay alert whenever you post something on Rust, to get perhaps some sneak peak.
Looking forward to connect :D