learnbyexample@programming.dev to Programming@programming.devEnglish · 3 months agoReinvent the Wheelendler.devexternal-linkmessage-square4linkfedilinkarrow-up146arrow-down10
arrow-up146arrow-down1external-linkReinvent the Wheelendler.devlearnbyexample@programming.dev to Programming@programming.devEnglish · 3 months agomessage-square4linkfedilink
minus-squarePyro@programming.devlinkfedilinkarrow-up21arrow-down2·edit-23 months agoThe problem with recreating cryptographic libraries is that unless you are a cybersecurity expert, you are very likely to leave hidden vulnerabilities in your implementation.
minus-squareunique_hemp@discuss.tchncs.delinkfedilinkarrow-up20arrow-down1·3 months agoYep, reinvent it for educational purposes and then burn it with fire.
The problem with recreating cryptographic libraries is that unless you are a cybersecurity expert, you are very likely to leave hidden vulnerabilities in your implementation.
Yep, reinvent it for educational purposes and then burn it with fire.