Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd be wary of that last point depending on what you mean by "isolate". Chroot is not a security feature so the isolation is not perfect. This shouldn't matter if you trust the application but if it could be malicious (or manipulated by something malicious) then you'd want a harder boundary. `pivot_root` perhaps?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: