@Reiddragon@fedi.reimu.info It's very easy to call someone else's gigantic project used by the entire world "broken-ass shitty code" while you have no experience running any sort of project at this scale.
@SuperDicq how tf does a security researcher even isolate a bug without having at least a basic understanding of programming and the codebase they're analyzing for exploits? And when you know exactly what the issue is, you usually know how to fix it
also, calling ffmpeg "broken-ass shitty code" when the world's multimedia infrastructure is built on it... this is someone who just wants to be edgy for the sake of it
And nobody wants their video decoder to be slower by any percentage. Nobody is going to say "I want the slower version, because I care about memory safety". Literally nobody except Rust nerds.
Most people don't even know what that means and just want the faster software.
@Reiddragon@SuperDicq it's standard operating procedure to run ffmpeg jailed/isolated for user supplied content because it's vulnerable to untrusted input exploits
@dngrs@chaos.social Go and try to ask a normie if they would rather want "memory safety" or if they want their phone battery to last 20% longer while watching videos.
@SuperDicq I don't think it's a universally true statement that memory safety is only something for "Rust nerds"; image/video decoding can be a pretty juicy attack vector (cf LogoFail or the various issues Apple had over the years). Of course all bets are off once you're in ASM land, but reducing attack surfaces does have value.
@dngrs@chaos.social I know that's not video decoding and power consumption works, but I'm just making up a hypothetical scenario that does accurately describe my personal opinions on most of those pointless "I rewrote it in Rust" projects.
@SuperDicq 1. normies aren't security experts. Why should I consult them on security matters? 2. phones do video decoding in hardware 3. we probably agree that when given a tradeoff of performance vs. security, security isn't *always* the correct choice, e.g. I'm not very happy with the amount of spectre etc mitigations; my personal threat model would prefer to have those disabled 4. 20% isn't an accurate figure, but of course ideally the RIIR impl isn't slower at all. I think it's doable.