Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't buy the claim that process isolation is superseded by NaCl-style validation.


I agree... You can only validate what is presented to you; a hacker won't kindly hand you a piece of code to run after exploited a hole and ask you to verify it.

It also rather circuitous, browsers already verify what they are executing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: