Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Depends, there are VM escapes.


Yeah but defense in depth. Now you have to own the VM and escape the VM, and the latter usually requires an attack against the exact VM you are running which may be hard to determine.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: