@mirabilos@dalias@nxadm tbf, I sympathize. After all, naming is one of the two hardest problems in computer science (along with cache invalidation, and off-by-one errors). And I had to rename LMDB shortly after its release, to avoid confusion with other projects... it's tough to come up with good names.
@nxadm@dalias if you look at it as an attempt to make human programmers into interchangeable code spewing machines, then Google's new emphasis on AI code spewing machines probably means golang was a failure.
@nxadm@dalias Go has this weird design mentality of fetching every dependency you're using, straight from github. And no dynamic linking. It's too opinionated, IMO.
Not to mention it was intentionally designed to be less flexible than C.
@dalias if you're really self-hosting your email you should have an actual domain name of your own though, and it should resolve both forward and backward.
@dalias my favorite was always hosts whose IP address is encoded in their DNS name. I used to just flat reject them but now I only greylist them because more subscription mailers are using dynamic hosts for sending.
@zrail@thomasfuchs definitely. But most people in computing have almost zero exposure to actual computer science.
Meanwhile, yes, my degree was in Computer Engineering, in the Electrical Engineering and Computer Science department at UMich's College of Engineering. I practiced real software engineering, at UMich, at JPL writing software for the Space Shuttle, and elsewhere. But I'm also just a hacker at heart.
@dalias it's a DoS but not the same as an actual crash, which is unanticipated. There is zero security exposure from an assert failure: no data leak, no unauthorized access, no possibility of code injection. The trigger conditions are clearly spelled out in the assert itself, so it's trivially remedied. Calling it a security issue dilutes the word "security" to meaninglessness.
@bagder the other one we see is calling assert failures crashes. It's not a SEGV, there's no possibility of data exfiltration or RCE. There's no security exposure, it's just a bug. One that was anticipated hypothetically by the original developer, but whose final disposition wasn't decided upon way back when.
E.g. /* can this even happen? */
They toss in an assert, and it lives quietly in the code for decades before someone definitively shows yes, it can happen...
Reminder: AI "generated" code is 100% plagiarized. You must not accept code of unknown provenance into your code base. Doing so opens you up to potential copyright infringement lawsuits. Nobody needs a repeat of the SCO vs IBM lawsuit over ownership of Unix.
Accepting AI-assisted code is just legally untenable. That's black and white, there's nothing to debate. Projects that accept it are idiots and should be shunned.