Escape via unhygienic macros
Phil Hofer
(03 Jul 2019 23:31 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(04 Jul 2019 03:59 UTC)
|
||
Re: Escape via unhygienic macros
Marc Nieper-Wißkirchen
(04 Jul 2019 05:57 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(04 Jul 2019 17:03 UTC)
|
||
Re: Escape via unhygienic macros
Phil Hofer
(04 Jul 2019 19:02 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(04 Jul 2019 18:55 UTC)
|
||
(missing)
|
||
Fwd: Escape via unhygienic macros
Marc Nieper-Wißkirchen
(08 Jul 2019 12:21 UTC)
|
||
Re: Escape via unhygienic macros
Marc Nieper-Wißkirchen
(08 Jul 2019 12:38 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(08 Jul 2019 16:28 UTC)
|
||
Re: Escape via unhygienic macros Lassi Kortela (04 Jul 2019 19:45 UTC)
|
||
Re: Escape via unhygienic macros
Lassi Kortela
(04 Jul 2019 19:56 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(08 Jul 2019 04:57 UTC)
|
||
Re: Escape via unhygienic macros
Marc Nieper-Wißkirchen
(04 Jul 2019 20:27 UTC)
|
||
Re: Escape via unhygienic macros
Lassi Kortela
(14 Jul 2019 15:41 UTC)
|
||
Re: Escape via unhygienic macros
John Cowan
(14 Jul 2019 17:59 UTC)
|
Interesting discussion of an interesting proposal. Indeed guarantees are always subjective, and even many security experts look at things from an economic standpoint: how much protection can we get for a given amount of effort. VM security is extremely difficult to make airtight. Some analysts say the JVM is one of the biggest generally unacknowledged security risks around the world. A lot of holes are found, and it's on so many devices that are patched late, if at all. Closest comparisons to this SRFI that spring to mind are the Dhall language (basically an extremely restricted Haskell for writing configuration files that are not supposed to have side effects) and OpenBSD's new pledge() system call which can be used to disable all but the given groups of Unix syscalls for the remainder of the life of the current process (e.g. programs that don't use the network can disable all socket operations). OpenBSD's stance was precisely that while there are fancier security frameworks with fine-grained configurable policies, they are so intricate that people won't use them as intended. pledge() buys a good amount of protection while being so simple that programmers will actually use it. Perhaps you intended to make a similar argument in this thread, John? That the SRFI provides a simple protection that is worth its small cost and should be combined with other precautions.