• ferric_carcinization@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    5 days ago

    Does the number of security vulnerbilities scale linearly or exponentially with the number of threads?

    But seriously, why would you make something like this in assembly? I can understand not wanting to use libraries, but even using C would make it portable.

    I would personally prefer to not to use assembly & C for handling untrusted input, which is something that a web server does constantly.

    This still seems interesting, but I can’t understand why assembly was chosen for such a complex project. Compilers are pretty good at optimizing & computers are very fast, so I don’t see there to be anything to gain by doing this.

    They say that their cryptography implementations are fast, but that’s not the only thing that’s important.

    • HiddenLayer555@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      But seriously, why would you make something like this in assembly?

      Coding exercise? To see if they can?

    • librebyte@lemmy.mlOPM
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      Thank you for your great feedback, use case… a controlled and isolated RT environment? I don’t know I’m trying to figure it out where to use it at the end I bookmarked because real assembly project is always interest me.