The paper outlines methods to enhance security in existing C and C++ software by implementing various types of integrity checks such as Stack Integrity, Control-Flow Integrity, Heap Data Integrity, and Pointer Integrity. While it cites positive impacts from these measures in Apple's environments, critics argue that these approaches are merely mitigations that do not fundamentally resolve the underlying memory safety issues. Vulnerabilities remain prevalent, and without addressing the core structural issues and incorporating memory-safe languages like Rust, simply adding mitigation techniques won't suffice. The discussions point toward a clear need for better tooling, a cultural shift in security practices, and a longer-term approach to redesigning systems for improved safety.