Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

- Make it easy to write buffer exploits


- Off-by-one errors should be security vulnerabilities, rather than just crashes


Can't say I agree. You tend to find crashes pretty quickly. Security vulnerabilities tend to be found later in much more embarrassing ways.


I'm pretty sure he was joking, in the same spirit as the comment one level up.


And the software that protects from them.


A language that allows buffer exploits cannot by definition protect you from them, because the tooling is unsound.


Yes it can, the proof is the security software that is written to do that in C/C++. Nobody is saying that the protection will protect you over all possible buffer exploits.


There are no guarantees that the security software is not exploitable given the quicksand it is built on.


What's the difference to my comment? I didn't make any assertion about warranties.


From Computer Science point of view if you are writing bug verification tools in an unsafe language, there is no guarantee the verification tool is giving safe results back.

The same unsafe constructs can cause memory corruption in the verification tool and lead to a behavior where the wrong decisions are taken.

So the fact that many C verification tools are written in C itself does not proof anything about how safe the language could be.

For me personally C could be much better if:

- There was no automatic decay from arrays into pointers (call an explicit operation to do so, like &a[0])

- There was a proper string type available

- Arrays were bound checked (with optional disabling of bound checking, like many other languages offer)


I have studied computer science, thanks. You are arguing against something I never said.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: