Rust adds another layer of trusting the compiler isn’t backdoored. All UNIX/Linux systems use the gcc toolchain, so having it written in C would mean less dependencies for the OS.
More like Rust has rotted someone’s brain. “Hey, I can’t code safely, so I will use this new toy that is supposed to make me”. This line of thought is OK as long as it does not get imposed on anything I do as a programmer
Noticed an overall “vibe” where Rust critics repeatedly have points that sound like they make sense, and I can’t really think of examples of them saying confusing nonsense, or refusing to elaborate on a point when challenged to. Whereas, other way around for Rust defenders.
Best way I know to determine what’s “sus” is to look at what’s defended by people who are willing to elaborate on the points you ask them to elaborate on. It’s almost a perfect gauge. But maybe not quite perfect, and you could totally call it “vibes.” I remain not totally certain about Rust.
If you are not a programmer, you do not have the background or understanding to assess any arguments about a programing language.
The vast majority of anti-Rust people are stubborn and toxic types who don’t know it and refuse to learn. On the other end you have those who do use it, know why it’s such a good language, and criticize it constructively so that it continues to improve. Rust lacks many quality of life features that other languages have, but that is by design. It’s meant to create rock-solid software and forces you to think about things like lifetimes and ownership scopes that other languages let you take for granted.
You can’t easily move from languages like C++ or Python to Rust without learning and accepting new concepts and patterns. If someone can’t or won’t do that, they should not be doing any programming.
You care, you are the one that brought it up as an issue with rust.
I ask as a rhetorical question to shed light on the fact that compiler back doors are a vanishingly small fraction of total security exploits, while the memory bugs that rust specifically addresses make up the vast majority.
The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments.
13 years. That’s how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It’s just that in C a “mistake” can often mean a memory-safety bug that would put user data at risk (…) That’s the nature of memory-safety bugs in C: they can hide in plain sight.
And while you bring up a “boo-hoo, software written in C has bugs” common knowledge, to my best knowledge standard Rust library still has unsafe parts. But that’s no problem, because contracts, sure. Thanks for demonstrating how full of nonsense you are, bye
it’s weird how often these same strawman arguments are the response when Rust’s safety advantage over C comes up. Usually the same adolescent tone too.
The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments.
13 years. That’s how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It’s just that in C a “mistake” can often mean a memory-safety bug that would put user data at risk (…) That’s the nature of memory-safety bugs in C: they can hide in plain sight.
Why did you make me read these paragraphs without explaining how they connect to the context? Let me guess: they don’t connect to the context, you’re just designing your replies to mislead people dumb enough to be vulnerable to your manipulation tactics? With no consideration for me whose time/energy you’re wasting, much less them who you’re confusing?
Make sure you know exactly what “compiler” and “backdoor” mean. With that, you can probably skip the rest of this comment.
aubeynarf seems to be framing things in a way that might make you think C is immune to compiler backdoors, and might also make you think we’re in agreement on that point. That’s based on absolutely nothing. C has no special resistance to compiler backdoors. I hear Rust introduces new risk here, but I don’t see any reason to reframe that as all the risk with C being in other areas.
aubeynarf seems to be framing things in a way that might make you think security exploits all have similar levels of severity. Like, if you make a list of 100 exploits, it will be about the same severity as any other list of 100 exploits. That is not true. Scoring would be based on what damage the exploits can do, not how many there are.
If aubeynarf’s framing makes it seem like known exploits are scored by sheer quantity, that would also imply security experts put a lot of focus on “scoring” known exploits at all. We don’t. We might put a lot of energy into counting and scoring unknown exploits if we could, but we can’t, so this is again not an honest mistake or a slight twist from reality - it’s completely made up from nothing. Not only would quantity be unrelated if we did have a big use for scoring known exploits, but we don’t. Known exploits are not unknown exploits. We’re trying to expose unknown exploits, and fix them. Counting and scoring the known ones is just something that happens along the way. We would never weigh the entire concept of compiler backdoors by counting the ones we’ve identified.
aubeynarf seems to be framing things to set an impression of “oh this guy knows what he’s talking about and he thinks compiler backdoors are no big deal, so they must be no big deal.” If you fall for that, there’s not much I or anyone can do for you.
You know that bans/removals are documented right? If you don’t see your post it’s because you didn’t post it. You’re not being censored, go take your meds
Weak gaslighting attempt but if you could show me where to find it documented I would appreciate that.
If anyone is confused, feel free to ask me for proof I’m telling the truth. If I posted it here, I’m pretty sure I’d be at risk of getting banned for evading the post removal (because the proof would also lead you back to the reply chain that was removed)
Edit - maybe this counts as proof without showing any removed content:
Strange times.
how many compiler back doors have we seen versus use-after-free/stack overflow attacks?
The anti-Rust crowd baffles me. Maybe C++ has rotted their brain to the point they can’t “get” the borrow checker.
My only complaint is that its syntax is an ugly mishmash. Should have copied scala or f#
More like Rust has rotted someone’s brain. “Hey, I can’t code safely, so I will use this new toy that is supposed to make me”. This line of thought is OK as long as it does not get imposed on anything I do as a programmer
Who cares? Why do you ask?
I can’t code, so C++ doesn’t have much space in my brain, but Rust still seems a lot more sus to me than C.
Rust seems sus to you? What’s that based on, “vibes, bro”?
Essentially, yeah.
Noticed an overall “vibe” where Rust critics repeatedly have points that sound like they make sense, and I can’t really think of examples of them saying confusing nonsense, or refusing to elaborate on a point when challenged to. Whereas, other way around for Rust defenders.
Best way I know to determine what’s “sus” is to look at what’s defended by people who are willing to elaborate on the points you ask them to elaborate on. It’s almost a perfect gauge. But maybe not quite perfect, and you could totally call it “vibes.” I remain not totally certain about Rust.
If you are not a programmer, you do not have the background or understanding to assess any arguments about a programing language.
The vast majority of anti-Rust people are stubborn and toxic types who don’t know it and refuse to learn. On the other end you have those who do use it, know why it’s such a good language, and criticize it constructively so that it continues to improve. Rust lacks many quality of life features that other languages have, but that is by design. It’s meant to create rock-solid software and forces you to think about things like lifetimes and ownership scopes that other languages let you take for granted.
You can’t easily move from languages like C++ or Python to Rust without learning and accepting new concepts and patterns. If someone can’t or won’t do that, they should not be doing any programming.
You care, you are the one that brought it up as an issue with rust.
I ask as a rhetorical question to shed light on the fact that compiler back doors are a vanishingly small fraction of total security exploits, while the memory bugs that rust specifically addresses make up the vast majority.
About random numbers? Not really
Are you referring to where I said “I want to know some random numbers Rust isn’t giving me, and that’s a problem with Rust?”
Because that was in your imagination.
Or are you referring to where I said “Rust wants to know some random numbers it isn’t giving itself?”
Because that was also in your imagination.
In reality, I brought up that I’ve heard Rust adds another layer of trusting the compiler isn’t backdoored.
While you’re spouting nonsense, this is happening:
https://www.infoq.com/news/2025/11/redis-vulnerability-redishell/
And while you bring up a “boo-hoo, software written in C has bugs” common knowledge, to my best knowledge standard Rust library still has unsafe parts. But that’s no problem, because contracts, sure. Thanks for demonstrating how full of nonsense you are, bye
it’s weird how often these same strawman arguments are the response when Rust’s safety advantage over C comes up. Usually the same adolescent tone too.
I’m the guy you were replying to here. I’m not spouting any nonsense in this thread. Did you reply to the wrong person, or is this a false accusation?
Why did you make me read these paragraphs without explaining how they connect to the context? Let me guess: they don’t connect to the context, you’re just designing your replies to mislead people dumb enough to be vulnerable to your manipulation tactics? With no consideration for me whose time/energy you’re wasting, much less them who you’re confusing?
Our team has reviewed this interaction, and cannot issue a refund at this time.
For anyone confused:
Strange how your bad faith reply is still here, and with many upvotes, while my reply calling you out appears to be gone.
This is an example of how discussions like this are more appropriate for nostr, where there are no bans / post removals.
You know that bans/removals are documented right? If you don’t see your post it’s because you didn’t post it. You’re not being censored, go take your meds
Weak gaslighting attempt but if you could show me where to find it documented I would appreciate that.
If anyone is confused, feel free to ask me for proof I’m telling the truth. If I posted it here, I’m pretty sure I’d be at risk of getting banned for evading the post removal (because the proof would also lead you back to the reply chain that was removed)
Edit - maybe this counts as proof without showing any removed content:
https://piefed.social/post/1458050/comment/8784509#replies
If you click the link, it’s blank, yet it has a “parent comment” link that leads to where I was replying
Edit 2 - tried to post an archive link but archive.org didn’t seem to work the way I thought?
Is the link I posted above showing what I described for other users?
Can confirm that post still exists. I just downvoted it. Still exists when I open the link you posted in a browser, too, just collapsed.
https://lemmy.zip/modlog?page=1&actionType=All&userId=25498760
Nope, not seeing it there
Yeah I know you don’t. It’s because your comments aren’t being removed
So this link shows a comment for you, not just a blank space? https://piefed.social/post/1458050/comment/8784509#replies
Here’s a screenshot of what I’m seeing
There’s an ongoing effort to get gcc to compile Rust.[1]
https://lwn.net/Articles/907405/ ↩︎
This seems relevant:
https://youtu.be/Fu3laL5VYdM