toot.cat is one of the many independent Mastodon servers you can use to participate in the fediverse.
On the internet, everyone knows you're a cat — and that's totally okay.

Administered by:

Server stats:

427
active users

this latest edition of "Android team posting nothing but Ws for adopting Rust" is super important because it identifies that:

*you don't have to actually rewrite all your old unsafe C/C++ code to get the benefits of adopting safe languages, in terms of reducing vulnerabilites*

because they identify that most bugs are in new/changed code (with exponential decay!), so if you preferentially write new code in a safe language, your vulnerabilities crater even though most of your code is still unsafe!

security.googleblog.com/2024/0

Google Online Security BlogEliminating Memory Safety Vulnerabilities at the SourcePosted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...
Public

@Gankra my professional opinion is that this is correct and you should RIIR mostly only if you need the code base to be safe on a shorter horizon than the half life of your bugs

Public

@fay59 eh with this result you still need to riir any component that gets a lot of changes. but like any Haunted components no one touches? fuck it

Unlisted public

@Gankra @fay59 just rewrite parsers and other user-input-related stuff and that already gets you like 90% there

Public

@Gankra I want to introduce Rust at work, but my company's products mostly run on a RTOS that Rust doesn't support.

Public

@Gankra @bsdphk

„We can simulate the results.“

Unlisted public

@Gankra Rewriting the old code is also almost guaranteed to introduce new bugs, just not of the memory corruption kind.

Public

@Gankra Ok but an even better way is to stop writing new code nobody asked for.

Public

@dalias @Gankra

Even better is to stand up and walk into the nearest forest to live out your days.

Public

@Gankra is this because older code is going to be more stable and well tested so a lot of the vulnerabilities will have been removed already?

Public

@eniko pretty much

Public

@Gankra that makes a lot of sense