On Apr 10, 02014, at 11:01, Brad Carleton <[email protected]> wrote:

> It's pretty much luck that most versions of Node seem to be unaffected by 
> heartbleed.  But what is being done or what can be done to prevent a similar 
> vulnerability in the future?

Code review, paid audits, release agility, simple interfaces, don’t hide 
outside-visible details underneath the API surface, move things into languages 
where bounds-checking is the norm.


Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to