nrc
@ncameron.org
1.2K followers 170 following 280 posts
Posts Media Videos Starter Packs
Nope, quid all the way up. But if you’re talking in thousands you’d use grand
At this point I think there are so many places code can panic, that a simple system like that wouldn’t help much. A better system could exist but you’re looking at some kind of dependent types at that point
If the vulnerability were well-hidden and the crate was well-trusted, etc.

So really, being cautious about crates (or indeed any intermediate position), is just YOLOing it but with security theatre
gap between versions being released and alarms being sounded, any crate can execute arbitrary code on your machine, and all it takes is one crate maintainer having a turn to the dark side, or someone threatening their family, etc., and BOOM. And tbh, I bet that time gap could be long
which is actually not too bad if you've really got your eyes open to the risk. But most software projects have a risk appetite somewhere in between, and there is not a good solution for that. A lot of folks are using tools and trying to be cautious about crates, etc. But there is inevitably a time
One of the big issues with supply chain security is there is no good compromise position: you can be totally paranoid about it and minimise your deps and review every version in detail (which is both a lot of effort and goes against the grain of effective/idiomatic Rust use) or you can YOLO it,
Can you say why you trust it? IME it means trusting a bunch of people I don't have reason to trust and also a bunch of crates (or versions of crates) which don't have coverage (unless coverage has got a lot better recently). Which is not to say you shouldn't trust it, but I'm curious why you do
I used to be pretty relaxed about it, and now it seems like everything is on fire and we've collectively got our heads in the sand (mostly this is a change of opinion, but partially also a change in the environment)
Rust programmers, do you worry about supply chain security? I.e., that a dependency might contain a bug or malicious code?
South Wellington in particular did awesome, proud to live here! And a good show on Māori wards, though honestly I’m sad that there were any no votes at all. The rest of Aotearoa needs to do better, much better on that front
Proud of you, Te Whanganui-a-Tara, mostly good voting, even if we did let a few of the cookers in. Could have been better (if there was a better mayoral candidate, if Chung et al didn’t get back in, and so forth), but could have been a lot worse.
Reposted by nrc
i've got over 70k kills in the "meeting buddha on the road" minigame. it's tough at first but once you master the spin kick you can get the hammer you need to break the wheel of samsara pretty quick
”im addicted to this Buddhism game” —things someone who is good at buddhism would say???
I like the borders! If they had used a gradient on the background but not the design element, I think it would work nicely, but there’s gradients everywhere! All going in different directions!
And the icons look bad - too busy, too distracting. They’ve started with a design then made it as minimal as possible then added a bunch of gradients, so it’s both character-less and busy.
Liquid Glass review: the overall look is nice, some of the effects and layering need more polish, way too many animations and flashes and they feel too attention grabbing. Overall feels like a good idea but needs another few months of iteration
That's a good idea!
Heh, no it's exactly the sort of thing one should use. What I meant was that I was looking for something which might appear in real code one would write outside of a benchmark
I was trying to do it without 'cheating', black_box does work, but I can't find anything else which does
Surprisingly difficult to trick the Rust compiler into not eliding bound checks in a micro-benchmark (even more so in a way which isn't nullified by the CPU's branch prediction)
I have availability for Rust consulting or coaching. More details soon, and yep my website needs updating. But if you're considering adopting Rust, want your team to use Rust more effectively, or need a drop-in staff engineer, get in touch!
And I bet people are thinking about how to do a targeted attack. And I bet it will be possible some how
I’ve been thinking a bit about supply chain security, but honestly the equivalent risk from ai seems so much worse. The equivalent of an SBOM is impossible, any concept of trust feels impossible. Like a targeted attack seems really difficult, but a fuck up feels guaranteed