Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
-
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
-
Be respectful: Treat fellow community members with respect and courtesy.
-
Quality over quantity: Share informative and thought-provoking content.
-
No spam or self-promotion: Avoid excessive self-promotion or spamming.
-
No NSFW adult content
-
Follow general lemmy guidelines.
view the rest of the comments
I would love to see a study about people that follow C++ best practices. Put a bunch of C++ devs and tell them to write some programs. Then see how many of those programs would be valid according to rust's borrow checker.
Whatever % of people that "fail" this test, is much higher than the 0% of people that would do so using rusts' compiler.
Of course, programs that don't pass the borrow checker can be totally memory safe, but that would need to be analyzed on a case by case basis.
Programs that do pass the borrow checker aren't guaranteed to be totally memory safe, so the number isn't actually 0% for Rust either: https://github.com/Speykious/cve-rs
Yes, I know about that one. That is code made specifically to reproduce a bug in the compiler. Unless you do it on purpose, there's no way you'd get hit by it. If it were, they would have fixed it, it's been known for several years.