←back to thread

276 points chei0aiV | 1 comments | | HN request time: 0.22s | source
Show context
kragen ◴[] No.10458647[source]
Probably worth pointing out that the author is the project lead of Qubes, one of the very few promising projects in the vast wasteland of computer security.
replies(2): >>10459513 #>>10459645 #
kachnuv_ocasek ◴[] No.10459645[source]
Very few? Seriously?
replies(4): >>10459760 #>>10459957 #>>10460536 #>>10461036 #
Pfiffer ◴[] No.10459760[source]
Yeah man the only good things in CS are Postgres and common lisp. Everything else is a waste of time.
replies(1): >>10461082 #
nickpsecurity ◴[] No.10461082[source]
Try crash-safe.org or Cambrige's CHERI for hardware; Qflow w/ YoSys for OSS synthesis; Microsoft's VerveOS for OS correctness; Racket for LISP; Google's F1 RDBMS for databases; Ur/Web for web apps; Cornell's JIF/SIF/SWIFT/Fabric for distributed apps; Coqasm for assembler; CompCert and CakeML for compilers/tooling.

That's just a tiny selection from my collection. Lots of exciting things going on for secure and correct tools that are still powerful. Postgres and Common LISP are both weak and boring in comparison despite being good tools. :P

replies(1): >>10462621 #
smt88 ◴[] No.10462621[source]
I don't know if I understand how most of these things could be considered secure unless they've been heavily attacked already.

Are they all so much more secure by design that you consider them to be great projects?

My experience is heavily with server-side web languages, so I'm particularly skeptical of those. Even the most secure-seeming web languages have buggy, insecure implementations at first.

replies(1): >>10462645 #
kragen ◴[] No.10462645[source]
Those projects are mostly research into how to make software and hardware less buggy; most of them are not themselves written with a threat model in mind.
replies(1): >>10464141 #
1. nickpsecurity ◴[] No.10464141[source]
Exactly. Most could be, though, if people put forth the effort. So I keep mentioning such work.

Note: This comment is mainly for others reading along. Something I do on forums. I know you already understand this point.