So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
-
In other words: you may think you'll never make mistakes, but you will. In assembler, your mistakes turn into exploitable bugs. In Rust, your mistakes don't compile. I'm going with Rust. And if you think you're too experienced to make mistakes, that's how you miss them :-)
-
You know nothing about my assembly machine coding rules and constraints, like forcing everything coded in FSM's. There are very simple but repetitive, iterative coding rules and constraints that can ensure you will make no mistakes, and if any, that they will be found in a snap.
- Show replies
New conversation -
-
-
Yes this is true. But it has the draw back that if your compiler is 200 millions lines of code like GCC, even free, you'll have an issue checking the compiler integrity all by yourself.
-
In general compiler bugs are rare, and are a lot less likely to result in exploitable code and a lot more likely to cause runtime issues that are easily detectable. You're going to avoid a lot more bugs using a compiler than you're going to introduce from the compiler itself.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.