How security holes happen

Chris Kaynor ckaynor at zindagigames.com
Mon Mar 3 17:55:32 EST 2014


On Mon, Mar 3, 2014 at 2:25 PM, Chris Angelico <rosuav at gmail.com> wrote:

> On Tue, Mar 4, 2014 at 9:19 AM, Cameron Simpson <cs at zip.com.au> wrote:
> > On 03Mar2014 09:17, Neal Becker <ndbecker2 at gmail.com> wrote:
> >>  Charles R Harris <charlesr.harris at gmail.com> Wrote in message:
> >> >
> >>
> >> Imo the lesson here is never write in low level c. Use modern
> >>  languages with well designed exception handling.
> >
> > What, and rely on someone else's low level C?
>
> Someone needs to port Python to LISP.
>
> And then write a LISP interpreter in JavaScript.
>
> And an ECMAScript engine in Pike.
>
> And a Pike interpreter in Java.
>
> And a Java run-time written in ActionScript.
>
> It's turtles all the way down...
>

You can go much simpler than that. Merely port Python to LISP, then write a
LISP interpreter in Python. Done.

Now, bootstrapping those interpreters might pose a bit of a challenge...


>
> ChrisA
> --
> https://mail.python.org/mailman/listinfo/python-list
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.python.org/pipermail/python-list/attachments/20140303/9c1b2d28/attachment.html>


More information about the Python-list mailing list