This document evaluates the effectiveness of type-based control flow integrity (RTC) defenses. It finds that while RTC can prevent some attacks, it has limitations. Typed return-oriented programming (TROP) exploits rare type collisions between function pointers and "execution gadgets" to hijack control flow in real-world applications like Nginx. While RTC is more practical than points-to analysis, it is not sufficient on its own due to challenges like separate compilation and support for assembly code. Overall, RTC improves security but attackers can still leverage nested function collisions and abundant "gadgets" to bypass its protections.