Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cybersecurity in general seems to be mostly approached in an after-the-hack, damage control and -repair manner.

Actual security architecture deliberations are rare, the fundamental properties of our tools, the operating systems, programming languages and software, ignored and unquestioned.

Almost all systems are unable to provide secure modularity and resource sharing, because they simply cannot isolate and account for the effects and requirements of their components.

Since most systems we use and built on top of today emerged in the pre-internet era, they were not built with these capabilities in mind.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: