home.social

#rust — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #rust, aggregated by home.social.

  1. I just deployed my website rewrite on a subdomain.

    SystemD is awesome! It simply creates a UNIX socket my Rust binary can listen on.

    The next things on my list are human.json, Webmentions and Bookmarks. Then I just need to migrate some slashpages to finish the rewrite!

    #systemd #website #personalBlog #devlog #rust #IndieWeb

  2. Shortwave uses #Rust 🦀 and #GTK, and it works pretty well.
    Maybe I can try to get it to compile natively for #Windows :windows: and/or #macOS :mac: instead?

    Trdo is a nice experience on Windows but it’s the worst in terms of buffering. It’s #OpenSource too, so maybe I can change the backend to use libVLC?

    I want something I can use at work, but I also want to have fun in the process 🤔

  3. Currently implementing avian_fdm (github.com/viccuad/avian_fdm) in bevy_fs. This will temporarily ground the little jet, but it will help it fly way smoother in the future. 😅 🏗️

    #Bevy #Rust #FlightSim #Aviation #DevLog #GameDev

  4. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  5. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  6. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  7. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  8. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  9. 🚀 Hold onto your keyboards, folks! Bun's #transformation into #Rust was finally "merged" like a hipster's first surfboard, promising to revolutionize... absolutely nothing you'd notice. 🦀 Web devs everywhere would be thrilled if they weren’t too busy pretending this matters. 🙄
    old.reddit.com/r/rust/comments #Bun #WebDev #News #HipsterTech #HackerNews #ngated

  10. 🚀 Hold onto your keyboards, folks! Bun's #transformation into #Rust was finally "merged" like a hipster's first surfboard, promising to revolutionize... absolutely nothing you'd notice. 🦀 Web devs everywhere would be thrilled if they weren’t too busy pretending this matters. 🙄
    old.reddit.com/r/rust/comments #Bun #WebDev #News #HipsterTech #HackerNews #ngated

  11. 🚀 Hold onto your keyboards, folks! Bun's #transformation into #Rust was finally "merged" like a hipster's first surfboard, promising to revolutionize... absolutely nothing you'd notice. 🦀 Web devs everywhere would be thrilled if they weren’t too busy pretending this matters. 🙄
    old.reddit.com/r/rust/comments #Bun #WebDev #News #HipsterTech #HackerNews #ngated

  12. 🚀 Hold onto your keyboards, folks! Bun's #transformation into #Rust was finally "merged" like a hipster's first surfboard, promising to revolutionize... absolutely nothing you'd notice. 🦀 Web devs everywhere would be thrilled if they weren’t too busy pretending this matters. 🙄
    old.reddit.com/r/rust/comments #Bun #WebDev #News #HipsterTech #HackerNews #ngated

  13. 🚀 Hold onto your keyboards, folks! Bun's #transformation into #Rust was finally "merged" like a hipster's first surfboard, promising to revolutionize... absolutely nothing you'd notice. 🦀 Web devs everywhere would be thrilled if they weren’t too busy pretending this matters. 🙄
    old.reddit.com/r/rust/comments #Bun #WebDev #News #HipsterTech #HackerNews #ngated

  14. Thanks to the bank holiday (in Germany) I had some time to finish the third part of my **Learning Rust** post series!

    This part is all about structs, tuples and (crazy) enums!

    And of course some MIRs again, what else?

    lukasrotermund.de/posts/struct

    #Rust #rustlang #LearningRust #TheRustProgrammingLanguage

  15. Dear opensource developers,

    I added an "adoption" list to the repro-env README, if you publish pre-compiled binaries and you successfully adopted it to allow anyone to reproduce them from source code to prove the absense of a build server compromise, you are very welcome to add yourself to the list. 😺

    github.com/kpcyrd/repro-env#ad

    #reproducible #reproduciblebuilds #supplychainsecurity #rust

  16. A tiny menu bar app that shows Lemmy posts.
    Finally can stay forever on lemmy even not opening the browser! 😂
    Thinking of using it as a mod tool to see new posts in communities I moderate.

    github.com/tracyspacy/lemmy-tr

    #lemmy #rust #rustlang

  17. Hahahahah Rust coreutils packages sort of are generally available. Wanted to poke about with ripgrep. So, sudo apt update && sudo apt install ripgrep, and apt, the affable golden retriever that it is installed it happily. Went to try it out.

    man ripgrep… don’t know that.
    which ripgrep… nope, you are a ninny.

    dpkg -L ripgrep -> /usr/bin/rg.

    Hahahahahah. The standard is disappointment. Cheers, bags of mostly water! #linux #rust #coreutils #standards #rotfl

  18. 🦀 rlisp
    Rust semantics with LISP syntax. A transparent s-expression frontend that compiles directly to Rust — no runtime, no GC, just (s-expr → .rs → binary). github.com/ThatXliner/rust-but

    #rust #lisp #plt

  19. Is your company currently hiring for a role that includes using Rust?

    Reply with a link to the opening and any relevant context.

    If you're not, we'd appreciate a repost for visibility

    #rust #rustlang #programming

  20. Is your company currently hiring for a role that includes using Rust?

    Reply with a link to the opening and any relevant context.

    If you're not, we'd appreciate a repost for visibility

    #rust #rustlang #programming

  21. Is your company currently hiring for a role that includes using Rust?

    Reply with a link to the opening and any relevant context.

    If you're not, we'd appreciate a repost for visibility

    #rust #rustlang #programming

  22. Is your company currently hiring for a role that includes using Rust?

    Reply with a link to the opening and any relevant context.

    If you're not, we'd appreciate a repost for visibility

    #rust #rustlang #programming

  23. Is your company currently hiring for a role that includes using Rust?

    Reply with a link to the opening and any relevant context.

    If you're not, we'd appreciate a repost for visibility

    #rust #rustlang #programming

  24. Laundry Storage Organizer Market in Germany | Report – IndexBox

    This report is an inde…
    #Germany #DE #Europe #EU #Europa #Apartment/condoutilitycloset #Basementorgaragelaundryarea #Bedroom/bathroomhamperplacement #consumergoodsmarketreport #easy-clean) #forecast #Laundryroomorganization #laundrystorageorganizer #marketanalysis #Materialinnovation(e.g. #Modular/interlockingdesign #rust-proof #Space-savingfolding/collapsing #Wheel/castersystemsformobility
    europesays.com/germany/13795/

  25. FSRS-плагин для Obsidian: SQL-подобные запросы к карточкам, Rust/WASM

    Инструмент интервального повторения заметок Obsidian должен использовать современный алгоритм, работать локально с заметками как есть (без переписывания в карточки). Существующие в Obsidian плагины останавливаются на алгоритме SM-2 образца 1987 года. Альтернативные решения есть «где-то еще», вне свободного ПО, вне Markdown‑first архитектуры — привязаны к облаку или проприетарному формату. Я написал свой, потому что не нашёл подходящего. FSRS, вычислительное ядро на Rust, скомпилированное в WebAssembly, и SQL‑подобный синтаксис для табличной выборки. В статье — архитектура с WebAssembly, собственный парсер, лексер, замеры производительности. Любые запросы обрабатываются в сотых долях секунды. Blazingly fast 🦀 Это техническая статья. Если хотите пошаговое руководство для пользователя — вот обзорная статья .

    habr.com/ru/articles/1030950/

    #obsidian #FSRS #rust #webassembly #интервальное_повторение #typescript #sql #spaced_repetition

  26. FSRS-плагин для Obsidian: SQL-подобные запросы к карточкам, Rust/WASM

    Инструмент интервального повторения заметок Obsidian должен использовать современный алгоритм, работать локально с заметками как есть (без переписывания в карточки). Существующие в Obsidian плагины останавливаются на алгоритме SM-2 образца 1987 года. Альтернативные решения есть «где-то еще», вне свободного ПО, вне Markdown‑first архитектуры — привязаны к облаку или проприетарному формату. Я написал свой, потому что не нашёл подходящего. FSRS, вычислительное ядро на Rust, скомпилированное в WebAssembly, и SQL‑подобный синтаксис для табличной выборки. В статье — архитектура с WebAssembly, собственный парсер, лексер, замеры производительности. Любые запросы обрабатываются в сотых долях секунды. Blazingly fast 🦀 Это техническая статья. Если хотите пошаговое руководство для пользователя — вот обзорная статья .

    habr.com/ru/articles/1030950/

    #obsidian #FSRS #rust #webassembly #интервальное_повторение #typescript #sql #spaced_repetition

  27. FSRS-плагин для Obsidian: SQL-подобные запросы к карточкам, Rust/WASM

    Инструмент интервального повторения заметок Obsidian должен использовать современный алгоритм, работать локально с заметками как есть (без переписывания в карточки). Существующие в Obsidian плагины останавливаются на алгоритме SM-2 образца 1987 года. Альтернативные решения есть «где-то еще», вне свободного ПО, вне Markdown‑first архитектуры — привязаны к облаку или проприетарному формату. Я написал свой, потому что не нашёл подходящего. FSRS, вычислительное ядро на Rust, скомпилированное в WebAssembly, и SQL‑подобный синтаксис для табличной выборки. В статье — архитектура с WebAssembly, собственный парсер, лексер, замеры производительности. Любые запросы обрабатываются в сотых долях секунды. Blazingly fast 🦀 Это техническая статья. Если хотите пошаговое руководство для пользователя — вот обзорная статья .

    habr.com/ru/articles/1030950/

    #obsidian #FSRS #rust #webassembly #интервальное_повторение #typescript #sql #spaced_repetition

  28. FSRS-плагин для Obsidian: SQL-подобные запросы к карточкам, Rust/WASM

    Инструмент интервального повторения заметок Obsidian должен использовать современный алгоритм, работать локально с заметками как есть (без переписывания в карточки). Существующие в Obsidian плагины останавливаются на алгоритме SM-2 образца 1987 года. Альтернативные решения есть «где-то еще», вне свободного ПО, вне Markdown‑first архитектуры — привязаны к облаку или проприетарному формату. Я написал свой, потому что не нашёл подходящего. FSRS, вычислительное ядро на Rust, скомпилированное в WebAssembly, и SQL‑подобный синтаксис для табличной выборки. В статье — архитектура с WebAssembly, собственный парсер, лексер, замеры производительности. Любые запросы обрабатываются в сотых долях секунды. Blazingly fast 🦀 Это техническая статья. Если хотите пошаговое руководство для пользователя — вот обзорная статья .

    habr.com/ru/articles/1030950/

    #obsidian #FSRS #rust #webassembly #интервальное_повторение #typescript #sql #spaced_repetition

  29. #wtf they rewrote #bun in #rust using an #llm: github.com/oven-sh/bun/pull/30

    only one month after we saw the #claude sacrifice to the spaghetti monster from the leaked code of #anthropic.

    of course the testuite passes with sleep(1) fixes: github.com/oven-sh/bun/pull/30

    we need to open the strait of hormuz for strategic popcorn reserves...

    1M LoC change merged. m(