Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So whoever exploits that one process has complete control over everything, right ?


Well, they have control over the application, and whatever its VM has access to .. which is supposed to be limited to only the things that the application needs.


Point raised in the TFA is that one process unikernal has a much smaller attack surface than a linux instance running the process would have.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: