krogoth

joined 1 year ago
MODERATOR OF
[โ€“] [email protected] 1 points 3 months ago

You mean like FIST but with a huge revolver? ๐Ÿ˜

[โ€“] [email protected] 1 points 4 months ago

Not sure if that is even the point. The article is all about memory unsafe programming!!1!. But there is no context at all.

Sure, there are vulnerabilities because of unsafe memory handling. But I looked for some statistic which would bring unsafe memory handling into context with say the high profile vulnerabilities from the last few weeks / months. I haven't spent too much time on research but looking at some lists containing vulns from the last few months it seems as if all those pre-auth, priv escalation, directory traversal and whatnot very based on much simpler failures like wrong error handling or logical errors or missing code than unsafe memory handling.

I might be wrong, then please show me the numbers, but shooting at C/C++ because unsafe!!1! sounds like a very biased story there.

And while we are at it. I'd also be interested in C vs. (somewhat modern) C++.

[โ€“] [email protected] 0 points 10 months ago

Will have to look in the logs. Probably the pushing to Lemmy part.

[โ€“] [email protected] 2 points 11 months ago* (last edited 11 months ago)

Surprisesurprise ๐ŸŽ‰

 

cross-posted from: https://infosec.pub/post/4231412

Google Paid 6 Billion to Be Default Search Engine in 2021