Follow

hot take about the programming world 

We've known for at least a decade that memory safety vulnerabilities are *by far* the most common and destructive type of security vulnerability in software. That's not a hypothesis, we have data for this, and have had it for a long time - it's been true ever since parameterized queries nearly elimited SQL injections. It's not in question.

The fact that, despite this overwhelming data for over a decade, and despite things like Rust existing, the programming community at large *still* hasn't broadly acknowledged that memory safety is a high-priority threat to software security that warrants a drop-everything response, raises some extremely uncomfortable questions about the competence and trustworthiness of the field as a whole.

It also draws some similarly uncomfortable parallels with the pandemic response by major governments.

· · Web · 0 · 3 · 3
Sign in to participate in the conversation
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.