Skip to Content [alt-c]

Andrew Ayer


Systemd is not Magic Security Dust

Comment by Anonymous

Posted in reply to Comment by Reader DES.

This comment is owned by whoever posted it. I am not responsible for it in any way.

If you sincerely believe that rewriting [...] software in a memory-safe language would make it inherently more secure [...]

(emphasis mine)

Ooh, that's a nice strawman you've got there.

The author wrote:

To provide a meaningful improvement to security without rewriting in a memory-safe language, Apache would need to [...]

Which doesn't state that rewriting is the only thing needed to make it more secure. You're misrepresenting his "rewriting is one possible necessary condition, but I do not state whether it is a sufficient one" to "rewriting is one possible necessary and sufficient condition to making the software safer".

Not sure whether to attribute this to malice or accidental (or emotion-influenced) lack of reading comprehension.

Given the history of tactics employed by pro-systemd (and to be fair, anti-systemd) folks, it's getting harder to give the benefit of doubt. But I (and others, I hope) should strive to keep the discussion free of fame wars and intellectual dishonesty, right?

| Posted on 2016-12-28 at 09:22:46 UTC by Anonymous | Parent | Reply to This

Post a Reply

Your comment will be public. If you would like to contact me privately, please email me. Please keep your comment on-topic, polite, and comprehensible. Use the "Preview" button to make sure your comment is properly formatted. Name and email address are optional. If you specify an email address it will be kept confidential.

Post Comment

(Optional; will be published)

(Optional; will not be published)

(Optional; will be published)

  • Blank lines separate paragraphs.
  • Lines starting with ">" are indented as block quotes.
  • Lines starting with two spaces are reproduced verbatim.
  • Text surrounded by *asterisks* is italicized.
  • Text surrounded by `back ticks` is monospaced.
  • URLs are turned into links.