Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is nice. The best part is that all aspects of network access are now properly controlled so that security transitioned from a chain of trusted code to a chain of trusted security setup on hosts, with existing workable safe defaults.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: