Capital-L Libertarians lately haven't been all that distinct from Republicans. Sure, they tend to be more marijuana friendly. And they claim to want to cut spending or balance the budget, but so does almost every Republican, and 95% of them, given the right environment, e.g. single party control of all branches of gov't, immediately unbalance the budget further, barely cutting spending, if at all, and handing out even more unsustainable tax cuts. And you'd think, given the whole "personal autonomy as guiding principle" thing in little-l libertarianism, they'd be pro-choice, or at least "we may dislike it personally, but the gov't has no business getting involved". But basically every prominent Libertarian politician and thinker either is vocally anti-choice, or, even if they claim to be pro-choice, glaringly avoids criticizing massive steps towards anti-choice policies at both federal and state level.
I'll take the Libertarian party more seriously the moment they clearly decide that bodily autonomy, the single most basic human right, trumps (rather newly invented; within the last 100 years, most churches tended to go by quickening, not conception, as beginning of life) religious beliefs about non-conscious entities. For now, they're basically NRINO (Not Republican In Name Only).
Climate change (mostly the ice age ending) led to the extinction of various forms of megafauna like the wooly mammoth (which Colossal also aims to bring back), which led to the extinction of their species.
That's a weird way to spell "Humans murdered the shit out of megafauna more and more efficiently as they moved to areas where local megafauna didn't have time to evolve even behavioral defenses against human predation." Climate change moved roughly in sync across the globe, human arrival did not, and guess which one is more tightly correlated with mass extinctions selectively targeting megafauna?
Okay, so we have more safety within the Rust driver itself. I mean, maybe that's a good enough reason?
Yeah, that's exactly it. A huge percentage of the kernel level exploits and bluescreens in Windows stemmed from insecure device drivers, because there are far more devices that need drivers than there are programmers capable of writing bulletproof kernel mode C code. The Windows solution was to make it much easier to write user-mode drivers, but they're still in C, so they're still buggy as hell, they just don't bluescreen the box when they go down (and as a bonus, they're easier to debug, which makes it somewhat easier to find and fix bugs when they do go down). I've written code for Windows myself (years ago, for Windows 7/WS2008), and the internal development rules at Microsoft do make it harder to make stupid mistakes with buffer overruns and the like, but it's still C, the moment you start indexing an array all it takes is one mistake to introduce a critical vulnerability.
I think the only reason you see Rust advocated for in this space so often is because, in the systems programming space, there just aren't a lot of options:
Whatever you think of Rust, it's got the best memory-safety story of any reasonably mature, not-tied-to-a-single-corporate-overlord language here that gets roughly bare-metal performance and doesn't involve non-deterministic garbage collectors. That's really it. It has other nice-to-have features (e.g. decent standard library; built-in, reasonably well-done package management with a lively package ecosystem), but at kernel level, "memory-safe-by-default systems programming language" is the selling point. Adding interfaces to make it easy for multiple Rust-based device drivers to maintain that safety through a common interface rather than each of them individually wrapping the interface with FFI in a more-or-less safe way doesn't seem wildly unreasonable.
noun. a cardinal number represented in the U.S. by 1 followed by 33 zeros, and in Great Britain by 1 followed by 60 zeros.
All forms of English are primarily short scale at this point, just like the U.S., even if they were historically long scale. The term "thousand million" still survives as an historical curiosity, but it's synonymous with billion in most usage nowadays. It's Continental Europe (excluding Russia/Turkey) that favors the long scale. Like British/American English, Russian favors short scale, luckily for Google (not that they'd pay either version of a decillion, in either dollars or rubles).
How many fad-and-fade languages have you seen with meaningful uptake lasting more than five years, including uptake in the major software development corporations? I'm serious here. I've been programming professionally for a couple decades, and as an amateur for a decade before that, and the closest I've seen to this was Go, which started rising around the same time as Rust, but faded quite a bit when it became clear it was too opinionated (no operator overloading means no drop-in replacements for language features like integers, collections, etc.), sort of badly straddled the boundary between a productive language and a performant language (it got marketed as a faster Python and a more expressive C/C++, but AFAICT, all the uptake was high-level developers looking for something faster, it just didn't provide what systems programmers needed).
And Rust has a lot going for it simply in terms of uptake (ignoring all merits of the language, just how far it's spread). When Microsoft is integrating it into their core products, and Linux is integrating it into the kernel, that's well-beyond where any fad language I've ever seen has gotten.
Are you joking? You have to be joking. If you put even a tiny fraction of the security and stability features of Rust, things that are desirable even before we get into functional improvements, you'd be porting some form of:
And to be clear, some of that is tractable. C++ started with RAII, and in the past decade or so added built-in reference-counted memory management with partial thread-safety (the reference count itself is managed atomically, but the data it points to is 100% unprotected), type-inferencing, and limited forms of destructuring assignment. It also has a concept of iterators, though it's a concept that doesn't fundamentally make them any safer if you're using them manually, rather than via a foreach-style loop. But any attempt to add the safety and security features of Rust to C in a way that was opt-out rather than opt-in (and no, opt-in isn't good enough, because the people who need to do so the most, don't) would break every existing C program, and involve introducing so much new syntax to C that it would be a brand new language.
C++ itself has made historical decisions that mean it can't do a lot of this either. They can introduce better ways to work with iterators, but the underlying protocol is fundamentally unsafe with the standard library types (vector's iterators are glorified pointers; they can't be made safe without undoing much of the performance benefits they rely on, or restricting operations like arbitrary incrementing and decrementing that existing code needs. They can introduces new things, e.g. ranges and company, but they're hamstrung when it comes to removing old, inherently unsafe things.
Sure, you could add a bunch of useful collections types, better threading tools, strings that aren't terrible hacks around simple arrays with a handful of more-or-less insecure APIs to manipulate, etc. Those are nice quality of life improvements. Somehow C hasn't managed to do more than the most basic threading for decades, and it doesn't look like it's even trying. And it lacks any sort of package ecosystem, along with any standard build tooling that might support it (things Rust already has). But none of that is impossible in theory (even if history suggests its impossible in practice). What is impossible is making C any more secure or stable than it is without making into a completely new language.
None of this is to say that Rust is the one and only answer. I readily admit it's hard for beginners to pick up, precisely because of those ownership rules and lifetime issues that are the core selling point for Rust as a secure replacement for C (I know, I've been learning it recently). But I don't know of any competition that is suitable for general systems programming tasks (provides deterministic resource management, low-level access when necessary, high performance, etc.) that isn't C or C++, and the security story for both of those languages is "Don't make mistakes in the first place", a strategy that I'd trust maybe 1% of coders to manage (have you read the CERT Secure Coding Standard for C? I have, I'm a very good C programmer, and even I have trouble remembering to cover every possibility in there), and that's a very optimistic estimate.
The computer is to the information industry roughly what the central power station is to the electrical industry. -- Peter Drucker