Design a site like this with WordPress.com
Get started

An extremely casual code review of MetaMask’s crypto

This post describes a very casual code review of a few cryptography functions used by MetaMask. It does not describe any vulnerabilities. If you’re the kind of person who likes a meandering and amateurish code review that goes absolutely nowhere, you’ll enjoy this post. Read more…

Advertisement

Are You Sure You Want to Use MMAP in Your Database Management System?

Memory-mapped (MMAP) file I/O is an OS-provided feature that maps the contents of a file on secondary storage into a program’s address space. The program then accesses pages via pointers as if the file resided entirely in memory. The OS transparently loads pages only when the program references them and automatically evicts pages if memoryContinue reading “Are You Sure You Want to Use MMAP in Your Database Management System?”

The WebSocket Handbook: learn about the technology behind the realtime web

Introducing the WebSocket Handbook The WebSocket Handbook consists of four chapters: Chapter 1: The Road to WebSockets – looks at how web technologies evolved since the inception of the World Wide Web, culminating with the emergence of WebSockets, a vastly superior improvement on HTTP for building realtime web apps. Chapter 2: The WebSocket Protocol –Continue reading “The WebSocket Handbook: learn about the technology behind the realtime web”