Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You seem to think a lot of things that aren't security boundaries are security boundaries. There have been VM escapes too. VMs are not for running untrusted OS images you get from end users.

I'm done with this thread, have a nice day.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: