Sometimes I feel like the only 20something that likes C.
@amidvidy @KCombinator sure, but at least they're called out explicitly so people looking for vulns know where to look
-
-
@bascule I mean, this is difficult, because new classes of attacks are possible. For example, how would one detect a timing attack? -
@KCombinator beyond that, you can implement constant time primitives using asm! too -
@bascule suppose your compiler translate it to an instruction that runs in HW? Hard to trace down that far. -
@KCombinator it's architecture-specific assembly. The compiler can't molest it -
@bascule for example, offloading AES to a crypto accelerator -
@bascule sure, like that, but God knows what Intel and AMD and whoever else are going to put in microcodes
End of conversation
New conversation -
-
-
@amidvidy I want to use unsafe all the time in Rust crypto code. But ideally, you can force unsafe down to reusable low-level primitivesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.