logoalt Hacker News

vzalivayesterday at 11:02 PM0 repliesview on HN

This is yet another variant of the "fat pointers" technique, which has been implemented and rejected many times due to either insufficient security guarantees, inability to cross non-fat ABI boundaries, or the overhead it introduces.