krogoth

joined 2 years ago
MODERATOR OF
[–] krogoth 1 points 11 months ago
[–] krogoth 9 points 1 year ago (2 children)
[–] krogoth 1 points 1 year ago

You mean like FIST but with a huge revolver? 😍

[–] krogoth 1 points 1 year ago

Not sure if that is even the point. The article is all about memory unsafe programming!!1!. But there is no context at all.

Sure, there are vulnerabilities because of unsafe memory handling. But I looked for some statistic which would bring unsafe memory handling into context with say the high profile vulnerabilities from the last few weeks / months. I haven't spent too much time on research but looking at some lists containing vulns from the last few months it seems as if all those pre-auth, priv escalation, directory traversal and whatnot very based on much simpler failures like wrong error handling or logical errors or missing code than unsafe memory handling.

I might be wrong, then please show me the numbers, but shooting at C/C++ because unsafe!!1! sounds like a very biased story there.

And while we are at it. I'd also be interested in C vs. (somewhat modern) C++.

[–] krogoth 0 points 2 years ago

Will have to look in the logs. Probably the pushing to Lemmy part.

[–] krogoth 2 points 2 years ago* (last edited 2 years ago)

Surprisesurprise πŸŽ‰

[–] krogoth 1 points 2 years ago
[–] krogoth 1 points 2 years ago

A great lesson regarding OpSec.

[–] krogoth 1 points 2 years ago

IΒ wonder what effect this will have on that role in general.

view more: β€Ή prev next β€Ί