Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To be clear, this security model is bolted on top of the kernel and uses SELinux under the hood. It's not some magic thing, it can certainly be replicated and even improved.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: