this post was submitted on 15 Jan 2024
26 points (84.2% liked)
Privacy
31899 readers
428 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Both need a binary of themselfes compiled by some glowie at some point in time. Only if you build them from ground up or inspect the current compiler you can be sure. Otherwise stick to existing C compilers.
And what makes C not need a binary compiled by some glowie at some point in time?
The funny paradox lmao.
Rust can be bootstrapped with mrustc to my knowledge
That's true (also with other software that isn't for development). But this is not the only tool there. Just see crates.io and pkg.go.dev registries.
I think the only way to get "anonymously" some modules, libraries and frameworks is trough Tor.
I don't think that was the question. I think you are responding to a question like "what if the go/rust compiler has a backdoor", but the actual question was which are better from a privacy perspective, and what that means in this context is whether they mine the user's data (the developer using it), or if they upload statistics of the user's system or the compiled program at all.