@@ -11,7 +11,7 @@ Since operating systems are such an integrated part of computing, it is a very s
There have been numerous bugs and vulnerability in Linux, BSD, Glibc, Bash, X, etc. throughout the time, simply due to the lack of memory and type safety. Rust does this right, by enforcing safety statically.
Design do matter, but so does implementation. Avoiding these unexpected memory unsafe conditions (which are, by far, the biggest source of security critical bugs, since they're, by nature, unexpected). Design is a very transparent source of issues. You know what is going on, you know what was intended and what was not.
Design does matter, but so does implementation. Avoiding these unexpected memory unsafe conditions (which are, by far, the biggest source of security critical bugs, since they're, by nature, unexpected). Design is a very transparent source of issues. You know what is going on, you know what was intended and what was not.
The basic design of the kernel/userspace separation is fairly similar to genuine \*nix systems, at this point. The idea is roughly the same: you seperate kernel and userspace, through strict enforcement by the kernel, which is managing memory and other critical resources.