Borrow Checking, RC, GC, and Eleven Other Memory Safety Approaches | Dark Hacker News