Guidelines for Secure #RustLang Coding...
@lupyuen Having skimmed that paper as someone who's lurked on /r/rust/ and the Rust RFCs since before version 1.0, my impression is that the paper's focus is misguided:
1. I didn't see any evidence of them addressing the question of whether Rust affects the *number* of CVEs filed per amount of code, which seems like an obvious important thing to consider in a situation like this.
2. It comes across as if they're oblivious to the fact that other safe languages, like Python, have FFI support, like the ctypes module, and are calling out Rust as uniquely flawed in how the safe and unsafe code interact.
3. When they're classifying the vulnerabilities, it feels like they're oblivious to the fact that they are re-discovering the already well-known implications of constructs necessary for C FFI. (Had they approached it from a "does the real-world of Rust match the expectations for these constructs?" angle, it wouldn't bother me, but what they wrote feels like it lacks that self-awareness.)
4. I'm not a programming language theorist but, given the level of theoretical discourse that shows up in Rust RFCs, the kinds of ideas that show up in Rust team member blog posts, and the kinds of tooling, both experimental and production-ready, which get announced in /r/rust/, their recommendations for mitigating the risk feel so simple that I'd be surprised if they weren't already on the list of things that have already occurred to the relevant people and either are "easier said than done" or have non-obvious fatal flaws.
All in all, it just has an air of "People who know far less than they think they do acting with un-earned confidence".
(In fact, it feels vaguely reminiscent of the parts of the Unix Hater's Handbook that, yes, are a problem with Unix... but nobody else has managed to put anything better into practice.)
"The coronavirus won’t kill companies. But it will expose their bloated, overleveraged balance sheets"...
https://unherd.com/2020/03/covid-19-has-exposed-our-financial-fragility/
Research Paper on #RustLang Memory Safety... "Our analysis result reveals that Rust is very effective in preventing
memory-safety bugs if developers use safe Rust only"...
Google's #Embedded dev and testing tools for constrained microcontrollers like STM32L452 and nRF52832... Feels like PlatformIO...
https://9to5google.com/2020/03/19/google-pigweed-embedded-development/
Passing Strings from #RustLang to C... That's how we convert to Rust a #PineTime Watch Face @PINE64 built with the #LittlevGL #Embedded UI library running on @RIOT_OS https://lupyuen.github.io/PineTime-apps/articles/watch_face
I envy @cnxsoft working at home in #ChiangMai 😛
https://www.cnx-software.com/2020/03/18/a-typical-day-working-from-home/
Highly educational medical handbook... Reminds me of Medic School...
Maybe it's time we tuned down the fancy fake veggies... And go back to plain old veggies...
OrangeCrab #FPGA based on Lattice...
https://www.hackster.io/news/orangecrab-a-formidable-feature-packed-fpga-feather-04fd6c99eb0f
Learn #RustLang at home... Step by step from C! Based on @RIOT_OS and #LittlevGL running on #PineTime Smart Watch @PINE64 https://lupyuen.github.io/PineTime-apps/articles/watch_face
#PineTime FOSS Community ❤️❤️❤️ #RustLang, #FreeRTOS and @RIOT_OS... https://www.pine64.org/ Come chat with us on Discord / Matrix / Telegram @PINE64 ! https://wiki.pine64.org/index.php/PineTime#Community
Orange Crab and ULX3S #FPGA can run #RISCV Linux...
http://linuxgizmos.com/lattice-fpga-sbcs-can-run-linux-on-risc-v-softcore/
Memory Protection on #Arm Cortex M4F...
https://rileywood.me/2019/05/21/lightweight-memory-protection/
IoT Techie and Educator / Apache NuttX PMC