Also Kitsune is probably gonna use nightly from now on. Because "async fn in trait", some improved diesel diagnostics, and some better SIMD performance
I'm hoping to make Kitsune even faster. Just because.
Also Dalek Cryptography's curve25519 operations have nice parallel formulas using nightly stdsimd. Meaning if I finally get to porting the HTTP signatures over to pure Rust cryptography, that could give some nice boost in performance.
Well, in the edge case that someone actually uses Ed25519, which nobody does because Mastodon doesn't support it for some god damn reason.
So we are stuck with the slow and fragile RSA system and gigantic keys just because.
This is actually pissing me off. And the maintainers are just ghosting the issue that asks for updating the HTTP signatures Implementation
Side-sidenote: I wish we could utilize batch verification of Ed25519 signatures for inboxes. That would be really cool for performance reasons.
But unfortunately you don't really get feedback from the batch formulas on which messages were valid and which weren't.
So that's not really useful unless you wanna drop an entire batch of messages just because one happened to be malformed.
Hah, the last comment on the issue is mine asking whether they'd be open to at least adding Ed25519 support. From around 6 months ago.