Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The security boundary in this scenario would be the "syscall" layer. If it's secure by itself, then any higher-level wrapper on top of it is also secure.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: