Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Repo info
Activity
    Dan Dumont
    @hcldan
    I'm mainly referring to that
    Frank Lemanschik
    @frank-dspeed
    that is the nodejs fork
    :D
    the node bin is build from a forked version of nodejs that uses graalvm and not v8
    Dan Dumont
    @hcldan
    sooo... is there any security control via a security manager we can inject into the node runtime using graal?
    Frank Lemanschik
    @frank-dspeed
    no
    the code runs still inside nodejs
    so it is C=>JAVA=>JS=>JAVA
    all flows thru the node c code
    you can maybe modify that nodejs fork and build your own node version
    that supports that
    Dan Dumont
    @hcldan
    yeah... but at that point, I might as well just use node without graal, lol
    yes
    or use deno
    Dan Dumont
    @hcldan
    deno doesn't have an http2 server yet
    Frank Lemanschik
    @frank-dspeed
    or any other javascript runtime
    there are many
    sure it has
    Dan Dumont
    @hcldan
    yeah no... i know, I've been looking at them all
    Frank Lemanschik
    @frank-dspeed
    it has rust bindings my frind
    you can just use actix
    Dan Dumont
    @hcldan
    what I mean is... the http2 feature is still in an open ticket. There is no node compat module for http/tls/http2/etc
    so many modules we need are dead in the water
    I would like to use deno, I just need the project to get a little further
    looking for a stop-gap. since we already have a jvm, was hoping we could use graal for now
    Frank Lemanschik
    @frank-dspeed
    use rust directly
    thats at last my point on the server side
    a 19 lines rust server using actix outperforms nodejs easy
    nginx also by the way
    :D
    Dan Dumont
    @hcldan
    i understand :)
    Frank Lemanschik
    @frank-dspeed
    you can also use mustache and all that
    Dan Dumont
    @hcldan
    my goal is to not re-write the entire node_module tree we depend on
    Frank Lemanschik
    @frank-dspeed
    the ecosystem is there
    you will not depend on so much
    and you can do it incremental
    Dan Dumont
    @hcldan
    we depend on grpcjs
    Frank Lemanschik
    @frank-dspeed
    grpc is also much faster on rust
    everything is more memory save and fast in rust
    that why it gains popularity
    Dan Dumont
    @hcldan
    yes, but the code that uses grpcjs uses grpcjs. good or bad, it's a large project to port it all
    Frank Lemanschik
    @frank-dspeed
    then you should stay with nodejs
    your right there is no alternative
    Diego Parra
    @dpsoft
    Hi All! Any way to get more information about the SVM GC implementation?
    Remko Popma
    @remkop
    This channel is abandoned. Everyone moved to Slack: https://www.graalvm.org/slack-invitation/
    Diego Parra
    @dpsoft
    thanks!
    Remko Popma
    @remkop
    This channel should be closed.
    Alina Yurenko
    @alina-yur
    @remkop thank you for redirecting people to the right place!
    Hi everyone, since many people were asking to create a Slack workspace instead of Gitter, we've moved to https://www.graalvm.org/slack-invitation/. Please make sure to move there too, since we'll close Gitter rooms next week to avoid confusion. As an alternative you can also submit suggestions via GitHub discussions: https://github.com/oracle/graal/discussions
    Thank you!
    SwiftSafe
    @SwiftSafe

    IoT is a platform to connect the things which have an internet. A connected device is a complex solution, with various potential entry doors for an attacker. A connected device pentest IoT includes tests on the entire object ecosystem. That is electronic layer, embedded softwares, communications protocol, servers, web and mobile interface. The pentest on the electrical side,embedded softwares, and communication protocol concern vulnerabilities more specifically the IoT.
    There are three types of attacks on connected objects and embedded systems. Software attack, non-invasive and invasive hardware attacks. The first take advantage of software vulnerabilities, the second recover information from the hardware without damaging it while the third involve opening the components and therefore destroying them in order to be able to extract secrets. While the first two types of attacks do not require many resources, this is not thecase for invasive attacks, for which very expensive equipment is requires.

    1. Increase Visibility Across Siloed Business Functions to Improve Business Maturity.
    2. Drive Innovation with Data Analytics.
    3. Improve Efficiency with Fleet Monitoring
    4. Gain Real-time Insights from Connected Assets.
    5. Increase Production with Data Analytics.
    6. Monitor Workers to Mitigate Risk.

    <IMG SRC="javascript:alert('https://swiftsafe.com/');">

    <IMG SRC=javascript:alert('https://swiftsafe.com/')>

    <IMG SRC=JaVaScRiPt:alert('https://swiftsafe.com/')>

    <IMG SRC=javascript:alert("https://swiftsafe.com/")>