| ▲ | antioxide 3 hours ago | ||||||||||||||||
you can look at rust sources of real system programs like framekernel or such things. uefi-rs etc. there u can likely explore well the boundaries where rust does and does not work. people have all kind of opinions. mine is this: if you need unsafe peppered around, the only thing rust offers is being very unergonomic. its hard to write and hard to debug for no reason. Writing memory-safe C code is easy. The problems rust solves arent bad, just solved in a way thats way more complicated than writing same (safe) C code. a language is not unsafe. you can write perfectly shit code in rust. and you can write perfectly safe code in C. people need to stop calling a language safe and then reimplementing other peoples hard work in a bad way creating whole new vulnerabilities. | |||||||||||||||||
| ▲ | herni 3 hours ago | parent [-] | ||||||||||||||||
I disagree. Rust shines when you need perform "unsafe" operations. It forces programmers to be explicit and isolate their use of unsafe memory operations. This makes it significantly more feasible to keep track of invariants. It is completely besides the point that you can also write "shit code" in Rust. Just because you are fed up with the "reimplement the world in Rust" culture does not mean that the tool itself is bad. | |||||||||||||||||
| |||||||||||||||||