learnbyexample to ProgrammingEnglish · 24 days agoReinvent the Wheelendler.devexternal-linkmessage-square4linkfedilinkarrow-up147arrow-down10cross-posted to: [email protected]
arrow-up147arrow-down1external-linkReinvent the Wheelendler.devlearnbyexample to ProgrammingEnglish · 24 days agomessage-square4linkfedilinkcross-posted to: [email protected]
minus-squarePyrolinkfedilinkarrow-up22arrow-down2·edit-224 days agoThe problem with recreating cryptographic libraries is that unless you are a cybersecurity expert, you are very likely to leave hidden vulnerabilities in your implementation.
minus-squareunique_hemp@discuss.tchncs.delinkfedilinkarrow-up21arrow-down1·24 days agoYep, reinvent it for educational purposes and then burn it with fire.
The problem with recreating cryptographic libraries is that unless you are a cybersecurity expert, you are very likely to leave hidden vulnerabilities in your implementation.
Yep, reinvent it for educational purposes and then burn it with fire.