Hey HN, I shared an earlier prototype version of pgsodium but I just released 2.0 and felt this could be a good opportunity to share some updates!<p>[pgsodium](<a href="https://github.com/michelp/pgsodium" rel="nofollow">https://github.com/michelp/pgsodium</a>) 2.0.0 is a postgres extension that uses the [libsodium](<a href="https://doc.libsodium.org/" rel="nofollow">https://doc.libsodium.org/</a>) library to provide high-performance, modern cryptography support for PostgreSQL 10+.<p>2.0.0 includes a ton of new feature and a few bug-fixes:<p>* Support for [XChaCha20-SIV](<a href="https://github.com/jedisct1/libsodium-xchacha20-siv" rel="nofollow">https://github.com/jedisct1/libsodium-xchacha20-siv</a>) deterministic nonce-free encryption, this is useful for one-time workflows sacrificing a bit of speed and larger key size without worrying about nonce-handling issues.<p>* Support for [SignCryption](<a href="https://github.com/jedisct1/libsodium-signcryption" rel="nofollow">https://github.com/jedisct1/libsodium-signcryption</a>) Sign & Encrypt identity verification. Signcryption goes beyond public key verification to provide identity verification, and negotiating a shared-secret key between two parties to use fast streaming encryption of the payload.<p>* Key id support for HMACSHA 512/256, generichash, and shorthash. This extends support for pgsodium's key management feature to these useful hash functions.<p>* Support for low level [XChaCha20 streaming](<a href="https://libsodium.gitbook.io/doc/advanced/stream_ciphers/xchacha20" rel="nofollow">https://libsodium.gitbook.io/doc/advanced/stream_ciphers/xch...</a>). This is if you want to support your own low level algorithms on top of XChaCha20 for example, PASETO.<p>* More tests, docs, and small bug fixes in argument parsing<p>* In-memory key now protected with [sodium\_malloc](<a href="https://libsodium.gitbook.io/doc/memory_management" rel="nofollow">https://libsodium.gitbook.io/doc/memory_management</a>), now the key has additional protection from over/underflow memory attack.<p>Check it out at:<p>[<a href="https://github.com/michelp/pgsodium](https://github.com/michelp/pgsodium)" rel="nofollow">https://github.com/michelp/pgsodium](https://github.com/mich...</a><p>Please feel free to submit any issues you may have and as usual pull requests are greatly appreciated!