← Back to context Comment by robryan 19 hours ago The key requirement is memory safety, which would rule out Zig. 0 comments robryan Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗