Note from a donor
Kagamin
spam at here.lot
Wed Oct 25 13:22:46 UTC 2017
On Tuesday, 24 October 2017 at 16:37:10 UTC, H. S. Teoh wrote:
> (Having said all that, though, D is probably a far better
> language for implementing crypto algorithms -- built-in bounds
> checking would have prevented some of the worst security holes
> that have come to light recently, like Heartbleed and
> Cloudbleed.
Those were buffer overflows in parsers, not in cryptographic
algorithms.
More information about the Digitalmars-d
mailing list