"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
Posted May 14, 2019 21:59 UTC (Tue) by pyellman (guest, #4997)In reply to: "ZombieLoad": a new set of speculative-execution attacks by flussence
Parent article: "ZombieLoad": a new set of speculative-execution attacks
I well understand that "real" programmers and software engineers are contemptuous of Javascript and those who use it to build software and websites, but I think there's more than a little bit of envy in there as well. Yes, Javascript has a chaotic, undisciplined ecosystem of add-in functionality, but that ecosystem is also both enormously useful and just plain enormous. Futhermore, Javascript has been a vehicle and driver for widespread popularization of some decent ideas about what a high level language should offer (even if Javascript didn't necessarily invent those ideas). Again, I sometimes detect a hint of envy from "real" programmers in this regard.
Finally, I find it particularly unreasonable that this particular security threat, which has been brought to us by arguably some of the most highly skilled "real" computing engineers on the planet, should be your excuse for going on a rant about Javascript.
Posted May 15, 2019 9:17 UTC (Wed)
by weberm (guest, #131630)
[Link] (1 responses)
Posted May 15, 2019 14:00 UTC (Wed)
by pyellman (guest, #4997)
[Link]
Posted May 15, 2019 9:22 UTC (Wed)
by LtWorf (subscriber, #124958)
[Link] (6 responses)
Also, the wide ecosistem is there because js lacks a standard library. It doesn't even have basic string functions.
Posted May 15, 2019 9:59 UTC (Wed)
by eru (subscriber, #2753)
[Link]
That is not quite true, there are quite a lot of string functions in the built-ins, one could argue all the "BASIC":s are there :-). Even regexes. But there are also some strange omissions, like no built-in sprintf() equivalent.
Posted May 15, 2019 10:30 UTC (Wed)
by roc (subscriber, #30627)
[Link] (3 responses)
Curse it if you like, but if it goes away you'd better enjoy whichever vendor-controlled walled garden you end up in.
Posted May 15, 2019 13:11 UTC (Wed)
by LtWorf (subscriber, #124958)
[Link] (2 responses)
Posted May 15, 2019 19:21 UTC (Wed)
by samth (guest, #1290)
[Link]
Posted May 15, 2019 22:39 UTC (Wed)
by roc (subscriber, #30627)
[Link]
Posted May 15, 2019 14:08 UTC (Wed)
by pyellman (guest, #4997)
[Link]
Posted May 15, 2019 14:25 UTC (Wed)
by nix (subscriber, #2304)
[Link]
The problem isn't the language: the problem is the hardware. Whining about the language will not fix the ever-worsening flood of hardware vulns.
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
Also, the wide ecosistem is there because js lacks a standard library. It doesn't even have basic string functions.
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks
"ZombieLoad": a new set of speculative-execution attacks