Once everything is re-written in rust what will the hacker bros do?

Once everything is re-written in rust what will the hacker bros do?

Thalidomide Vintage Ad Shirt $22.14

Black Rifle Cuck Company, Conservative Humor Shirt $21.68

Thalidomide Vintage Ad Shirt $22.14

  1. 1 month ago
    Anonymous

    Your act as if the stupid ass syntax/ limited rust is the magic bullet. Guys, everyone is hackable. Everything is hackable. No matter what fricking programming language you're using.

    https://github.com/Speykious/cve-rs

    The only real reason rust even exists is to give sub-par developers a chance to develop software which at its optimum is similarly as fast as the software written in C++, Since most rust developers would not be able to even use one hundredth of the features of a language as complex as C++. That's why they need a compiler holding their fricking androgynous hands.

    • 1 month ago
      Anonymous

      I don't get it. I'm not mentally ill so I don't know rust. Does this mean rust segaults?

      • 1 month ago
        Anonymous

        Rust is a degen dev's 1st choice

    • 1 month ago
      Anonymous

      Rust is a degen dev's 1st choice

      I don't get it. I'm not mentally ill so I don't know rust. Does this mean rust segaults?

      I'm just confused because the guy who made this is a gay and there are troony commenters all speaking in irony.

    • 1 month ago
      Anonymous

      You're likely running code on your machine written by sub-par developers. You want them to be using Rust. People running your code don't know if you're sub-par or not. They want you to be using Rust.

      • 1 month ago
        Anonymous

        I'd rather run jeetcode than trooncode

        • 1 month ago
          Anonymous

          You're likely running both

          • 1 month ago
            Anonymous

            One of these days I'll program a microcontroller as a dedicated shitposting unit so I can exclusively run chudcode

    • 1 month ago
      Anonymous

      Why are you spamming a very out of the way typechecking bug? That shit isn't hackable
      Just talk about logic bugs, that would actually make your case

      • 1 month ago
        Anonymous

        >That shit isn't hackable
        https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=rust
        this meme language is no better or worse than c. it's as if you delusional child sex offenders think we get a different kind of internet than you do. somehow we're unable to look up CVEs posted on a regular? keep coping, Black person.

        • 1 month ago
          Anonymous

          it's actually even worse than c when working in unsafe context

        • 1 month ago
          Anonymous

          What do you think "that shit" meant? Please read carefully

    • 1 month ago
      Anonymous

      Post examples of Rust hacks which aren't social engineering or bad design. Post hacks due to the language.

      • 1 month ago
        Anonymous

        Post production rust applications and I'll consneed

      • 1 month ago
        Anonymous

        If you mean something inherent to the language design then RAII behavior can cause surprises in unsafe code. Normally you don't have to think very hard about when temporary values are destroyed because the compiler will let you know if it's too early, but with raw pointers you lose that promise and need to adjust your habits. See https://flak.tedunangst.com/post/comparative-unsafety and https://arxiv.org/pdf/2003.03296.pdf#section.5
        The fact that aliasing &mut references are immediate UB (that compiler optimizations actually take advantage of) can also be a problem. Some unsafe code that should "obviously" work is unsound.
        I don't know if these have ever escalated to actual hacks.

        Post production rust applications and I'll consneed

        There are a lot at this point, e.g.
        https://github.com/cloudflare/pingora
        https://source.android.com/docs/setup/build/rust/building-rust-modules/overview (used in e.g. the bluetooth stack)
        https://dropbox.tech/infrastructure/rewriting-the-heart-of-our-sync-engine
        https://firecracker-microvm.github.io/

      • 1 month ago
        Anonymous

        Don’t fall for it frens,
        >bad design
        is xher loophole to automatically wave away any valid response with
        >you’re holding it wrong
        ALL security issues are ultimately bad design issues

    • 1 month ago
      Anonymous

      >nocoder opinion
      lmao what is it with nocoder neet gays and their obsession with C and C++ ? You're a walking LLM trained on IQfy and /misc/ memes.

  2. 1 month ago
    Anonymous

    I don't like transfolk because I can't breed

    • 1 month ago
      Anonymous

      While this is true, you also don't want to pay alimony. You don't want to get child cucked by a stupid b***h.
      Be careful out there bro.

  3. 1 month ago
    Anonymous

    > delusional troony pedophile cope thread
    > still doesn't understand how computers work
    ah yes, the future of programming is safe in the hands of corporate wiener suckers that barely understand how a computer operates. well done, troony.

  4. 1 month ago
    Anonymous

    https://github.com/libsdl-org/SDL/issues/9377

    these delusional trannies keep trying to bend other's shit to their will. apparently they will be unable to use singletons later this year because its ((unsafe))? good luck getting any shit done lmfao

    • 1 month ago
      Anonymous

      wait, what?
      >remove static vars
      why would they wanna do that?

      and whats the plan then?
      put everything in globals?
      and what about code that used that feature?

    • 1 month ago
      Anonymous

      Static variables are safe.
      To make a static variable mutable you can do two things:
      - Add some sort of synchronization (a mutex, atomics, etcetera), to deal with thread safety and reentrancy
      - Use `static mut`, which requires unsafe {} to access
      It's easy to mess up usage of `static mut`, so they're considering deprecating it in favor of using UnsafeCell, which goes through raw pointers and makes it easier to think about what you're doing. This has all the same capabilities with a different API.
      This would only take effect on projects that opt into the 2024 edition and it's not very hard to switch. (And if you don't opt into the 2024 edition you may miss out on on a few bits of new syntax but you can still use most new features.)
      tl;dr somebody misread a blog post

    • 1 month ago
      Anonymous

      lmao why can't rust programmers just write their own alternative to SDL?

  5. 1 month ago
    Anonymous

    They'll get new surfaces due to libraries constantly being outdated.

    The issue with Rust, or really any language with parametric polymorphism is that it isn't really possible to use dynamic linking of libraries.

  6. 1 month ago
    Anonymous

    They just have to find a vulnerability in rust and they'll have an exploit for literally every device. Unironically this would be a dream come true for them.

    • 1 month ago
      Anonymous

      What kind of vulnerability could break open everything? Even libc vulnerabilities tend to be situational

    • 1 month ago
      Anonymous

      >They just have to find a vulnerability in rust and they'll have an exploit for literally every device. Unironically this would be a dream come true for them.
      They already found hundreds of vulnerabilities in C but C shills say it's user error. If they find any kind of vulnerability in Rust, Rust people would fix it.

  7. 1 month ago
    Anonymous

    Why does C's perfection make rust trannies seethe?

  8. 1 month ago
    Anonymous

    Who’s doing buffer overflows anymore really it’s 2024 lmao

    • 1 month ago
      Anonymous

      homies be playing CTF and think the real-world software are like that.

  9. 1 month ago
    Anonymous

    The same thing they are doing now: Social Engineering.

  10. 1 month ago
    Anonymous

    Memory bugs aren't easy to exploit anymore thanks to mitigations built into CPUs and OSes.
    Most exploited vulnerabilities these days are dumb logic errors made by shitty programmers.

    • 1 month ago
      Anonymous

      What's the deal with the Microsoft and Google statistics where the most damage is done by memory bugs? Why do security researches spend so much time on memory bugs?

      • 1 month ago
        Anonymous

        They didn't say most damage was done by memory bugs. They said most of the bugs they found were memory-related but cause they're low-hanging fruits.
        There's almost no new CVE scored above 8.5 that's caused by memory corruption.

        • 1 month ago
          Anonymous

          What's the deal with the Microsoft and Google statistics where the most damage is done by memory bugs? Why do security researches spend so much time on memory bugs?

          As a reference, Heartbleed which is one of the most famous memory bugs in the last 10 years only scored 7.5 because it's not that exploitable.
          https://nvd.nist.gov/vuln/detail/cve-2014-0160

          Meanwhile, you get a serious RCE exploit from software written in "safe languages" with automatic memory management like every month.

          • 1 month ago
            Anonymous

            Thats actually super interesting.. its not often you find good advice on a mongolian basket weaving forum

        • 1 month ago
          Anonymous

          https://www.chromium.org/Home/chromium-security/memory-safety/
          >The Chromium project finds that around 70% of our serious security bugs are memory safety problems.
          So that's already filtered for severity. Though Microsoft's own 70% statistic does seem to be across all CVEs.
          But yeah, I guess I buy that most exploits in general are for far stupider reasons. The average piece of software is not very much like Chromium.

  11. 1 month ago
    Anonymous

    Use the same backdoor the Feds use.

  12. 1 month ago
    Anonymous

    hack LLVM

  13. 1 month ago
    Anonymous

    So basically there will be no reason to use reverse engineering and look for kernel exploits once the trannies takeover.

Your email address will not be published. Required fields are marked *