Hacker News new | past | comments | ask | show | jobs | submit login

They are only garbage collected if they were introduced at runtime and there is no reference to them anymore. (detailed explanations can be found in the presentation linked in the announcement)

This allows you to symbolize external hash keys without fear of a DOS attack.




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: