It really is a great project.
IMO, everyone should read the safety section of their style guidelines. Will change the way you code for the better.
https://github.com/tigerbeetle/tigerbeetle/blob/main/docs/TIGER_STYLE.md#safety
Skip the $20 toxic Monsanto product that will kill you and your offspring:
- Squirt Bottle
- 50/50 water & white vinegar
- Dish soap
Wasps, ticks, ants, flies, anything...
Learn C, not Rust.

Spent the entire day debugging an issue. Android API 24 to 32 cashes the OS environment instead of always querying Libcore. So, it never gets updated on the Java side. Insanity...
kmp-process now supports KotlinMultiplatform/AndroidNative targets!
If you're compiling anything for macOS, do NOT use link flag -no_uuid
Latest version 15.4.1 requires LC_UUID load command for all binaries which is something new, andsurprising...
Sorry nostr:nprofile1qqstu7jjjx6n969erredexq539y2x0f7pks80zxhg9hh8dx8298s3espz4mhxue69uhk2er9dchxummnw3ezumrpdejqz8rhwden5te0dehhxarj94ex2mrp0yh8wmrkwvh8xurpvdjs45egyh and SparrowWallet users π¬
https://github.com/sparrowwallet/sparrow/issues/1728#issuecomment-2894335598
2 years is π€―
kmp-tor 2.0.0 was a complete refactor from 1.x.x and took almost 1 year until an alpha release was able to be cut.
kmp-tor-common now supports KotlinMultiplatform/AndroidNative targets!
Alternatively, check out other peoples' profiles and find others to follow through them.
kmp-file now supports KotlinMultiplatform/AndroidNative targets! Finally set about figuring how to locate the application's cache directory for API 32 and below (it's actually kind ofwild, see link below).
Next is to add android native support to the following downstream projects:
β’ kmp-tor-common
β’ kmp-tor-resource
β’ kmp-process
β’ kmp-tor
#tor
Tfw nostr:nprofile1qqsqfjg4mth7uwp307nng3z2em3ep2pxnljczzezg8j7dhf58ha7ejgprpmhxue69uhhqun9d45h2mfwwpexjmtpdshxuet5qyt8wumn8ghj7un9d3shjtnswf5k6ctv9ehx2aqnz0fd0 on nostr:nprofile1qqsqxuwm0l2yxl8x8esdahp38jkka6930lrfrls9yv0e59qpxn7q6zqpr3mhxue69uhkummnw3ezumt4w35ku7thv9kxcet59e3k7mgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdul5tmpg guilt trips you into coming back for round 2 of the nostr experience.
Been a long haul (a bout a year), but finally got there.
kmp-tor 2.0.0-alpha01 finally available with added support for Kotlin/Native & Node.js + Reproducible builds of tor.
Now for my next trick...
Finally got SHA3 + Derived Functions all implemented, as well as their Hmacs + KMAC.
Sounds like these countries will be in need of some "freedom" in the next 6 to 12 months π
Yeah, Andrew Chow's signapple (macOS), and osslcodesign (windows).
Both programs have their own file format for the detached signatures, and require each to be installed by people applying the detached signatures. I went with a standardized way with a single file format for both.
I ended up using Rust's apple-codesign because there were some finicky things with signapple, no built in notarize capability, doesn't work with smart cards.
All in all, works out well. The diff-CLI tool is also just a wrapper around the core kotlin multiplatform library, so is usable in applications too!
Made something for creating detached code signatures for macOS/Windows binaries.
1. Reproducibly build program
2. Copy it
3. Codesign (+ notarize for macOS) the copy
4. Take a 'diff' between the 2
The '.diff' is just the signatures, which can be applied to the unsigned binaries at a later date (so others can verify build reproducibility)
Think I'll publish it to Debian and Home Brew once I add a few things; check it out!
https://github.com/05nelsonm/kmp-tor-binary/blob/master/tools/diff-cli/README.md
Had a unique issue which #[0] found. Tor binaries for macOS weren't signed or notarized, so when he went to run `kmp-tor` on macOS aarch64 GateKeeper said "nope, not happening".
Literally 200 cuck bucks per year for an Apple Developer account + Codesigning Certificate from a CA for Windows.
Not to mention all the ceremony needed to sign the binaries while trying to make them easily verifiable (build reproducibility) for consumers.
OK rant over.
Codesigning programs for Apple and Windows is the most ridiculous/useless process.
I can understand wanting digital signatures for verifying you are installing what built, and then downloaded, but this is absurd and does nothing but tax developers. Smh.
Implementing all the SHA2 hashing algorithms was fun, now on to SHA3 πͺ
Hey Matt, if I am a library author and one or more of those projects are currently using my library, would I be eligible?
Zap Android, Samourai Wallet, Sphinx Chat, Amethyst (soon hopefully), Sparrow (in the works) is are just some of the projects I'm supporting currently with my Tor libraries
Any photoshop or Inkscape wizards want to contribute to an open source project?
I need a Kotlin-esque logo for https://github.com/KotlinCrypto
GM β‘
Yesterday I had a soda for the first time in I can't even remember.
I was up until 2am, and feel like I drank a 12 pack. How the shit do people drink this garbage on the regular?
It's a Highlander kind of night π€
It's a Highlander kind of night π€

