On Apr 10, 02014, at 11:01, Brad Carleton <[email protected]> wrote:
> It's pretty much luck that most versions of Node seem to be unaffected by > heartbleed. But what is being done or what can be done to prevent a similar > vulnerability in the future? Code review, paid audits, release agility, simple interfaces, don’t hide outside-visible details underneath the API surface, move things into languages where bounds-checking is the norm.
signature.asc
Description: Message signed with OpenPGP using GPGMail
