by mnemonik on 9/13/22, 3:14 PM with 16 comments
by infogulch on 9/14/22, 1:34 PM
The post mentions using `cargo vet` to organize audits of third party crates, discussed here a few months ago [0]. I'm more familiar with cargo-crev which does something similar, how do these auditing tools compare? The audit format [1] seems somewhat reasonable, but it doesn't include the review date and there's no mechanism to validate the authenticity of the auditors.
[0]: https://news.ycombinator.com/item?id=31719532
[1]: https://mozilla.github.io/cargo-vet/recording-audits.html
by staticassertion on 9/14/22, 2:50 PM
I kind of, vaguely loosely, feel like running multiple 'workers' within a single process is just not a reasonable goal. Ultimately if you have a multi-tenant requirement you should be using separate processes and pinning them to separate physical CPUs, and hope that that is enough. Not to discourage this, I can't wait to look back in a decade and see how this all has changed.
edit: Also, there are other use cases. Like, maybe I'm a single tenant and I'm deploying multiple workers to a single VM. I trust myself, but it would still be nice to have it be hard for those boundaries to be violated - driving up the cost is sane.
It also sort of reminds me of the Sysiphean task of removing ROP gadgets from the Linux kernel.
by RunSet on 9/14/22, 1:46 PM
As if users will not concede every requested permission to the first Monero miner that asks.
by fwsgonzo on 9/14/22, 2:15 PM