Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In exchange, each binary can be audited as a final product on its own merits, rather than leaving the final symbols-in-memory open to all kinds of dubious manipulation.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: