7h ago · 2 min read · Rust concepts and patterns that took me a while to internalize. Ownership in one page let s1 = String::from("hello"); let s2 = s1; // MOVE — s1 is now invalid let s3 = s2.clone(); // COPY — both valid (explicit, shows it costs something) f...
Join discussion1d ago · 5 min read · Cross-Program Invocations (CPIs) are Solana's superpower — and its most exploited attack surface. Every composable DeFi protocol on Solana uses CPIs. Lending protocols invoke token programs. DEXes invoke vault programs. Bridges invoke everything. And...
Join discussion2d ago · 9 min read · I've been writing proc macros for a while now. Derive macros for internal tools, attribute macros for instrumentation. And every time, the same two problems: quote! doesn't compose (you end up passing
Join discussion
4d ago · 5 min read · Most engineers focus strictly on encryption when building secure systems. But in high-stakes or heavily monitored network environments, encryption isn't always enough. Standard encrypted traffic (like
Join discussion