this post was submitted on 21 Sep 2025
22 points (100.0% liked)

Programming

24153 readers
352 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 2 years ago
MODERATORS
all 3 comments
sorted by: hot top controversial new old
[–] who@feddit.org 9 points 3 months ago

The essay includes several bits of advice for improving security in our field. IMHO, we overlook this one far too often:

Gordon Bell once observed that “[t]he cheapest, fastest and most reliable components of a computer system are those that aren’t there.” The most secure software dependencies are the ones not used in the first place: Every dependency adds risk.

[–] Static_Rocket@lemmy.world 2 points 3 months ago

I'm a little disappointed in the amount of time spent on the XZ attack. The title and it starting off with some good history made me think this was going to be more of a retrospective, looking into the issues that created the solutions used today.

It seems to be just calling out the solutions and how they would interfere or did interfere with a given attack, where XZ is most commonly used as an example.