Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's quite interesting. This is way outside of my wheelhouse - has this kind of approach been tried in other security contexts before? What would you even call that, virtualization?


The word is "bytecode" and the idea is as old as computing.


Java.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: