Note from a donor

Kagamin spam at here.lot
Wed Oct 25 13:22:46 UTC 2017


On Tuesday, 24 October 2017 at 16:37:10 UTC, H. S. Teoh wrote:
> (Having said all that, though, D is probably a far better 
> language for implementing crypto algorithms -- built-in bounds 
> checking would have prevented some of the worst security holes 
> that have come to light recently, like Heartbleed and 
> Cloudbleed.

Those were buffer overflows in parsers, not in cryptographic 
algorithms.


More information about the Digitalmars-d mailing list