base2048
totally-safe-transmute | base2048 | |
---|---|---|
17 | 18 | |
245 | 821 | |
- | - | |
0.0 | 4.0 | |
over 1 year ago | 3 months ago | |
Rust | JavaScript | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
totally-safe-transmute
-
Sudo Replacement
For example, there is this (pure safe Rust) code: https://github.com/ben0x539/totally-safe-transmute/blob/main... which accesses external resources (/proc/self/mem) in order to violate the safety guarantees.
-
A rust crate that lets you compress ASCII text to a single Unicode "character"
The first is the totally_safe_transmute crate. I mean, who wouldn't love library code that has .expect("welp") and .expect("oof") as its error handling? But that's not even the really scary part. Issue #2 ("i hate this") remains open to this day, but for obvious reasons there's no chance of resolution. This post has some context and a line-by-line explanation of how it works.
-
What do you expect from Rust in 2023?
You mean like this?
-
In C# you can transmute without `unsafe`
You can also do that in rust on linux: https://github.com/ben0x539/totally-safe-transmute/blob/master/src/lib.rs
-
Why choose Rust
I want to correct this statement: Rust can be safer, but not if a library you use contains unsound code. Unsoundness is most often caused by unsafe code, but not always (totally_safe_transmute, anyone?). There is a misconception that unsafe code blocks are always unsound and should be avoided at all costs, but they're completely fine if the safety contracts are upheld. In fact, unsafe blocks isolate the potential issues to make it easier to identify where undefined behavior may be occurring. unsafe code blocks are a feature of the language, and their usage should not be viewed as opting out of any safety the language provides, imo.
-
"# NONONONONONO DON'T YOU FUCKIN' DARE the safety features are there so that your programs aren't filled to the brim with security vulnerabilities. Unless you care A LOT(And I mean A LOT A LOT) about compile times, never use `unsafe`."
Just reimplement totally_safe_transmute in Zig. No need for unsafe.
-
I mean, it solves most library conflicts
Why transmute() when you can totally_safe_transmute()?
- Safe Transmute
-
Static Analyzer Rudra Found over 200 Memory Safety Issues in Rust Crates
Well, there is always the totally-safe-transmute.
-
// SAFETY: NO
They should use https://github.com/ben0x539/totally-safe-transmute
base2048
- How does Base32 (or any Base2^n) work exactly?
- Show HN: Host a Website in the URL
-
What digit bases do you like?
qntm did a fun project of using larger bases, constrained to subsets of unicode instead of ASCII like base64. It's specifically for social channels where you're constrained by the number of code points, but not bytes, so you want to maximize data per code point. base2048 is pretty impressive, and base32768 is just absurd.
-
Android 15's dessert name is "Vanilla Ice Cream"
Numbers don't have to loop until 32k or 2048 (or even up to 1,112,064, until such point the Unicode standard allows for more)
-
Twitter's anti-Mastodon filter evasion
On a semi-related note, they mention base64 encoding messages to evade filters. There were actually other base{n} methods [1] created specifically for Twitter to be more space optimized though not as readily available to operating systems. I guess this is less useful if they are really expanding the text limit to 4k soon but figured I would add it in the event they add a parser for base64.
[1] - https://github.com/qntm/base2048
-
A rust crate that lets you compress ASCII text to a single Unicode "character"
Actually, in the case of twitter they do some weird counting. It is mostly based on codepoints, true, but some codepoints are considered "heavy" and are counted twice, see https://github.com/qntm/base2048
-
New Twitter TOS
I know of one case of Twitter doing client side validation [1]. Maybe there are more?
1 - https://github.com/qntm/base2048#note
- Base 2048
-
Hacker News top posts: May 7, 2022
Base 2048\ (15 comments)
What are some alternatives?
tinyvec - Just, really the littlest Vec you could need. So smol.
ecoji - Encodes (and decodes) data as emojis
tamago - TamaGo - ARM/RISC-V bare metal Go
Base256 - Encode and decode data in base 256 easily typed words
rust - Rust language bindings for TensorFlow
hatetris - Tetris which always gives you the worst piece
usbarmory - USB armory - The open source compact secure computer
Assemblies-of-putative-SARS-CoV2-spike-encoding-mRNA-sequences-for-vaccines-BNT-162b2-and-mRNA-1273 - RNA vaccines have become a key tool in moving forward through the challenges raised both in the current pandemic and in numerous other public health and medical challenges. With the rollout of vaccines for COVID-19, these synthetic mRNAs have become broadly distributed RNA species in numerous human populations. Despite their ubiquity, sequences are not always available for such RNAs. Standard methods facilitate such sequencing. In this note, we provide experimental sequence information for the RNA components of the initial Moderna (https://pubmed.ncbi.nlm.nih.gov/32756549/) and Pfizer/BioNTech (https://pubmed.ncbi.nlm.nih.gov/33301246/) COVID-19 vaccines, allowing a working assembly of the former and a confirmation of previously reported sequence information for the latter RNA. Sharing of sequence information for broadly used therapeutics has the benefit of allowing any researchers or clinicians using sequencing approaches to rapidly identify such sequences as therapeutic-derived
advisory-db - Security advisory database for Rust crates published through crates.io
TatSu - 竜 TatSu generates Python parsers from grammars in a variation of EBNF
UnsoundCrates - Black list of all crates that promotes unsoundness
DumbIdeas