Toot
Written by Frederik Braun � on 2024-10-10 at 19:16
@jens1o Ah, yeah I think you can cheat yourself into doing something fun by going for a constructive approach, e.g., building a tiny proof-of-concept program that supports your claim.
- boundaries of memory-safe software languages (java, kotlin, rust) w.r.t to IO, hardware, networking etc
- leveraging new web technologies to make a website csrf-safe without using csrftokens at all (fetch metadata, same-site cookies etc.)?
- using type systems for safety?
- boundaries of source code analysis?
=> More informations about this toot | View the thread | More toots from freddy@security.plumbing
Mentions
=> View jens1o@chaos.social profile
Tags
Proxy Information
- Original URL
- gemini://mastogem.picasoft.net/toot/113284732030767259
- Status Code
- Success (20)
- Meta
text/gemini
- Capsule Response Time
- 222.935097 milliseconds
- Gemini-to-HTML Time
- 0.452627 milliseconds
This content has been proxied by September (3851b).