critique

1 article
sort: new top best
clear filter
0 2/10

A critical analysis arguing that C++26's new safety features (constexpr evaluation, contracts, standard library hardening) are insufficient responses to the memory safety crisis, and that the framing overstates their real-world impact—particularly regarding opt-in safety mechanisms and the misuse of the CrowdStrike incident and 70% vulnerability statistic as motivation.

C++26 CrowdStrike Microsoft Google Project Zero Chrome Android Henrique Bucher Matt Miller CVE CWE Top 25
lucisqr.substack.com · pjmlp · 1 day ago · details · hn