Hacker News new | past | comments | ask | show | jobs | submit login

> Essentially, the Docker approach boils down to downloading an unsigned binary, running it, and hoping it doesn’t contain any backdoor into your companies network.

I don't get why people still claim that this is "the Docker approach". This is not the docker approach, everyone hopefully knows this is an anti-pattern by now.




I don't get why people still claim that this is "the Docker approach".

Because it is the Docker approach (as distinct from the container approach necessarily).


You can download images from trusted sources with Docker




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: