Unable to load image

I change my mind I fricking hate Rust.

>:marseynerd:Hey rust, can I access my data?

>:marseyrave: No.

>:marseyreading: Why not?

>:marseyakshually:there exists a theoretical use case where accessing this data can cause issues.

>:marseygamer: Okay, Stack Overflow what do I do?

>:marseytrans2: Just write 400 lines of code so the pattern can exclusively work with one specific case

>:marseylongpost2: For fricks sake I guess I’ll try. $ Cargo Build & ./target/debug/r-slur.exe

>:marseysnappyautism: function panic

>:marseyterrydavis: That’s enough of that. :taddance: Miss me with that :marseytrain: software. :realisticelephant: I code for god now.

86
Jump in the discussion.

No email address required.

nah

Jump in the discussion.

No email address required.

Rust hamstrings old machines where C programs work just fine :marseylaptopangry2:

Jump in the discussion.

No email address required.

Good C code is only a few steps above machine code, i was hoping for Rust to be improved C with a better/more efficient compil3r but i guess noT, just more of the same bloat weve been seeing in everything lately

Jump in the discussion.

No email address required.

I see it a bit more sinister. The more bloated and restrictive you make your language then the more pathways you have to spy people thru hardware. Older hardware is more secure than new hardware 100%

Jump in the discussion.

No email address required.

I follow the second half but not the first. If you have tight relations btwn memory space and code security is intrinsic but idk how the inverse makes it less secure. Code injection or what?

Jump in the discussion.

No email address required.

They want to control your software. What kind of software you make, how you make it and where you make it. Nothing local, everything in a cloud or institutional account. I'm guess I'm rambling but that's my general fear of where industry is going.

Jump in the discussion.

No email address required.

Nah that's fair, user end code will get cucked shortly but theres still tons of stufff running legacy code

I'm seeing rn in lots of hardware with a 21st century UI running a 2000s relay board. Lots of shit comes off the production line with like 512mb of ram and a single core proc taking instructions from essentially a tablet. It would be nice to see a leap in embedded PCB dev

Jump in the discussion.

No email address required.

I saw this with secure boot, UEFI and TPM bs. Authentication at the firmware like this basically walls off the user from their own fricking property they paid for. If I want to mess around with my property and potentially wrech it, I should. It walls off user choice. Makes a general PERSONAL computer a Microsoft mandatory secureboot computers. No custom keys, no choice, no control. No software not ""trusted"" allowed on your own computer until your computer is just a fricking glorified smartphone with a tower.

Jump in the discussion.

No email address required.

I hate that more than i have words for

Jump in the discussion.

No email address required.

:marseymeds:

Not like a million shitty corpos are trying to find some margin while able to afford two devs and three ec2 containers, no - AWS, azure, and ali baba cloud exist in the market so that jews can control you

Jump in the discussion.

No email address required.

How is there any relationship between language constraints and spying through hardware :marseythonk:

Jump in the discussion.

No email address required.

Secure boot and trusted computer platform. Authentication at the firmware level. It's walling off the user from their own computer. Trusted against the user and not the user trusting the computer.

Jump in the discussion.

No email address required.

Using a different language to write my programs doesn't change that. It's not like writing a script in Python makes hardware encryption any different for the rest of my machine, and all that same stuff is exactly as accessible as it ever was through any other means

Jump in the discussion.

No email address required.

I cant articulate it but i can see it, if ur writing in a language close enough to the base rings that includes convoluted trusted 3rd party libraries it could leave mitm avenues open

Like if C called

#include TrustedMemHandler

But the function called out to a server or smth and could read what u wrote to memory

Once libraries and other packages get too dense for inspection coupled with relying on perpetually connected packages, it could open interesting vectors

Jump in the discussion.

No email address required.

I don't understand how this is an example of a restrictive language. I actually think you're talking about the exact opposite of what he was saying, since the entire point of this discussion is that rust can't do that with the safety on

Jump in the discussion.

No email address required.

Idk i only understand things v superficially

Ill look into rust and try to de rslur myself

Jump in the discussion.

No email address required.

I mean what you said is 100% right, I just really wanna know wtf the other guy meant when he said "restricted"

Jump in the discussion.

No email address required.

More comments
Link copied to clipboard
Action successful!
Error, please refresh the page and try again.