Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How is "There are all these gotchas when you have stuff running in the same OS and it just takes one little mistake and your adversary has root" not saying that the Unix security model is too hard to use?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: