nrc
@ncameron.org
1.2K followers 170 following 280 posts
Posts Media Videos Starter Packs
ncameron.org
At this point I think there are so many places code can panic, that a simple system like that wouldn’t help much. A better system could exist but you’re looking at some kind of dependent types at that point
ncameron.org
If the vulnerability were well-hidden and the crate was well-trusted, etc.

So really, being cautious about crates (or indeed any intermediate position), is just YOLOing it but with security theatre
ncameron.org
gap between versions being released and alarms being sounded, any crate can execute arbitrary code on your machine, and all it takes is one crate maintainer having a turn to the dark side, or someone threatening their family, etc., and BOOM. And tbh, I bet that time gap could be long
ncameron.org
which is actually not too bad if you've really got your eyes open to the risk. But most software projects have a risk appetite somewhere in between, and there is not a good solution for that. A lot of folks are using tools and trying to be cautious about crates, etc. But there is inevitably a time
ncameron.org
One of the big issues with supply chain security is there is no good compromise position: you can be totally paranoid about it and minimise your deps and review every version in detail (which is both a lot of effort and goes against the grain of effective/idiomatic Rust use) or you can YOLO it,
ncameron.org
Can you say why you trust it? IME it means trusting a bunch of people I don't have reason to trust and also a bunch of crates (or versions of crates) which don't have coverage (unless coverage has got a lot better recently). Which is not to say you shouldn't trust it, but I'm curious why you do
ncameron.org
I used to be pretty relaxed about it, and now it seems like everything is on fire and we've collectively got our heads in the sand (mostly this is a change of opinion, but partially also a change in the environment)
ncameron.org
Rust programmers, do you worry about supply chain security? I.e., that a dependency might contain a bug or malicious code?
ncameron.org
South Wellington in particular did awesome, proud to live here! And a good show on Māori wards, though honestly I’m sad that there were any no votes at all. The rest of Aotearoa needs to do better, much better on that front
ncameron.org
Proud of you, Te Whanganui-a-Tara, mostly good voting, even if we did let a few of the cookers in. Could have been better (if there was a better mayoral candidate, if Chung et al didn’t get back in, and so forth), but could have been a lot worse.
Reposted by nrc
theophite.bsky.social
i've got over 70k kills in the "meeting buddha on the road" minigame. it's tough at first but once you master the spin kick you can get the hammer you need to break the wheel of samsara pretty quick
jfruh.bsky.social
”im addicted to this Buddhism game” —things someone who is good at buddhism would say???
ncameron.org
I like the borders! If they had used a gradient on the background but not the design element, I think it would work nicely, but there’s gradients everywhere! All going in different directions!
ncameron.org
And the icons look bad - too busy, too distracting. They’ve started with a design then made it as minimal as possible then added a bunch of gradients, so it’s both character-less and busy.
ncameron.org
Liquid Glass review: the overall look is nice, some of the effects and layering need more polish, way too many animations and flashes and they feel too attention grabbing. Overall feels like a good idea but needs another few months of iteration
ncameron.org
That's a good idea!
ncameron.org
Heh, no it's exactly the sort of thing one should use. What I meant was that I was looking for something which might appear in real code one would write outside of a benchmark
ncameron.org
I was trying to do it without 'cheating', black_box does work, but I can't find anything else which does
ncameron.org
Surprisingly difficult to trick the Rust compiler into not eliding bound checks in a micro-benchmark (even more so in a way which isn't nullified by the CPU's branch prediction)
ncameron.org
I have availability for Rust consulting or coaching. More details soon, and yep my website needs updating. But if you're considering adopting Rust, want your team to use Rust more effectively, or need a drop-in staff engineer, get in touch!
ncameron.org
And I bet people are thinking about how to do a targeted attack. And I bet it will be possible some how
ncameron.org
I’ve been thinking a bit about supply chain security, but honestly the equivalent risk from ai seems so much worse. The equivalent of an SBOM is impossible, any concept of trust feels impossible. Like a targeted attack seems really difficult, but a fuck up feels guaranteed
ncameron.org
Hope it’s a great week!