Back to Home11/18/2025, 8:05:10 AM

High-performance hash utility with fast mode

1 points
1 comments

Mood

supportive

Sentiment

positive

Category

tech

Key topics

Rust

Cryptography

Performance Optimization

A high-performance hash utility written in Rust is introduced, offering fast mode and SIMD acceleration for verifying large amounts of data quickly, with the author highlighting its key features and performance benefits.

Snapshot generated from the HN discussion

Discussion Activity

Light discussion

First comment

N/A

Peak period

1

Hour 1

Avg / period

1

Comment distribution1 data points

Based on 1 loaded comments

Key moments

  1. 01Story posted

    11/18/2025, 8:05:10 AM

    13h ago

    Step 01
  2. 02First comment

    11/18/2025, 8:05:10 AM

    0s after posting

    Step 02
  3. 03Peak activity

    1 comments in Hour 1

    Hottest window of the conversation

    Step 03
  4. 04Latest activity

    11/18/2025, 8:05:10 AM

    13h ago

    Step 04

Generating AI Summary...

Analyzing up to 500 comments to identify key contributors and discussion patterns

Discussion (1 comments)
Showing 1 comments
vyrti
13h ago
Cryptographic hash utility in Rust that can verify 30TB of data in hours instead of days.

Key features:

- 15+ algorithms: SHA-2/3, BLAKE2/3, xxHash3, MD5, SHA-1 - Fast mode: Samples 300MB (start/middle/end) for 100x speedup on large files - SIMD acceleration: Automatic SSE/AVX/AVX-512/NEON optimization - Directory scanning with parallel processing - Hash database storage and verification - Compare databases to find changes/duplicates - .hashignore support (gitignore-style patterns) - Wildcard patterns for batch operations - Multiple output formats: standard, hashdeep, JSON - LZMA compression for databases - Cross-platform: Linux, macOS, Windows, FreeBSD

Perfect for backup verification, duplicate detection, and integrity checking. BLAKE3 achieves 1-3 GB/s throughput.

https://github.com/vyrti/hash-rs

ID: 45962560Type: storyLast synced: 11/18/2025, 8:05:40 AM

Want the full context?

Jump to the original sources

Read the primary article or dive into the live Hacker News thread when you're ready.