11
submitted 1 day ago by [email protected] to c/[email protected]
top 3 comments
sorted by: hot top new old
[-] [email protected] 4 points 1 day ago

Does the number of security vulnerbilities scale linearly or exponentially with the number of threads?

But seriously, why would you make something like this in assembly? I can understand not wanting to use libraries, but even using C would make it portable.

I would personally prefer to not to use assembly & C for handling untrusted input, which is something that a web server does constantly.

This still seems interesting, but I can't understand why assembly was chosen for such a complex project. Compilers are pretty good at optimizing & computers are very fast, so I don't see there to be anything to gain by doing this.

They say that their cryptography implementations are fast, but that's not the only thing that's important.

[-] [email protected] 2 points 11 hours ago

But seriously, why would you make something like this in assembly?

Coding exercise? To see if they can?

[-] [email protected] 1 points 17 hours ago

Thank you for your great feedback, use case... a controlled and isolated RT environment? I don't know I'm trying to figure it out where to use it at the end I bookmarked because real assembly project is always interest me.

this post was submitted on 29 Jun 2025
11 points (100.0% liked)

LibreByte

154 readers
24 users here now

Tecnologías libres para la comunidad.

Puedes enviar post a esta Comunidad sobre Tecnologías Libres en Español o Inglés.

founded 6 months ago
MODERATORS