
The Ember That Looks Like Ash
Building a time capsule for the thought that returns when you have stopped waiting for it. I'm on a mission to make sure the most alive thought you've ever had doesn't die in the dark. Before anything else — what is cited in this article Everything referenced below that is not direct experience building Cendre.Studio is listed here first. If something is not on this list, it is either general knowledge or my own observation. If you dispute a fact, the checklist is where to start. Sources used: [ ] OWASP Password Storage Cheat Sheet (2023) — PBKDF2 iteration count [ ] NIST FIPS 203 — ML-KEM (formerly CRYSTALS-Kyber) standardisation [ ] Supabase documentation — pgvector extension availability [ ] drand.love — tlock time-lock encryption documentation [ ] DoD 5220.22-M — National Industrial Security Program Operating Manual, data sanitisation standard [ ] Yann LeCun — "A Path Towards Autonomous Machine Intelligence" (2022, Meta AI) [ ] Grover's algorithm — quantum search, effect on symmetr
Continue reading on Dev.to Webdev
Opens in a new tab



