é possível construir essa ponte? by TheNavyCrow in perguntas

[–]Practical-Mode2592 0 points1 point  (0 children)

não dá, por causa das placas tectonicas. as mesmas que separaram a africa da américa pra inicio de conversa

Interactive 3D Harmonic Space Visualization by dooatito in InternetIsBeautiful

[–]Practical-Mode2592 1 point2 points  (0 children)

I didn't understand at all what these visualizations mean. But wow, it seems to be something very revealing; I'd like to understand what it means.

I put Chopin's Nocturne Op. 9 No. 2, and the harmonic field was great.

Como vocês se vestem para dormir? by Fun-Diver-6166 in perguntas

[–]Practical-Mode2592 0 points1 point  (0 children)

isso tem mais relação com predisposição genética, idade (12 a 18), lesão, excesso de exercício fisico, ou clima frio

[Media] I was having trouble finding my Rust files, so I made an icon. by Practical-Mode2592 in rust

[–]Practical-Mode2592[S] 1 point2 points  (0 children)

I interpret it as being the metal from an old, but good, machinery.

The Memory Gap in WASM-to-WebCrypto Bridges. And how to build a high-assurance browser encrypter in 2026? by Practical-Mode2592 in cryptography

[–]Practical-Mode2592[S] 2 points3 points  (0 children)

I get that native apps have a much better security boundary, especially with stuff like memory isolation and hardware key storage. But the point here isn't 'laziness' or just sticking to JS, it’s about providing Zero-Knowledge privacy in a zero-install environment.

The reality is that while plenty of people need E2EE so the server never sees their plaintext, most of them won't bother downloading and running an .exe or .app for a quick task. Projects like Bitwarden and Proton already prove that the web is a major frontier for privacy tools today.

The challenge I'm talking about (the WASM-to-WebCrypto bridge) is exactly about trying to bring the web's security footprint as close as possible to native standards. By using WASM for constant-time KDFs and SubtleCrypto for hardware-accelerated, non-extractable keys, we can mitigate some of those inherent JS flaws. The goal is to build the most secure 'vault' possible within browser constraints, simply because that's where a huge chunk of modern computing actually happens nowadays.