So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
-
You know nothing about my assembly machine coding rules and constraints, like forcing everything coded in FSM's. There are very simple but repetitive, iterative coding rules and constraints that can ensure you will make no mistakes, and if any, that they will be found in a snap.
-
Any time you're handling variable length data or parsing data structures, you're introducing the possibility of mistakes causing undefined behavior by overflowing a buffer. It doesn't matter what coding style you use.
- Show replies
New conversation -
-
-
The thing is that I trust more my own experience, coding technics, tricks, constraints, iterative FSM oriented methodologies, done manually, in assembly language, than any 200 millions lines of code compilers that are impossible to review entirely and backdoored by NSA or CIA.
-
See, I don't, and that's why I wouldn't hire you :-) I also have a lot of experience writing secure C and assembly, but I am not going to delude myself into thinking I wouldn't wind up with fewer exploitable mistakes in Rust.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.