Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is not at all my area of expertise or anything even remotely close to it but this seems to be a very similar sounding story to one of the core underpinnings of Fuschia.

My understanding was that they put everything kind of dangerous into the micro-kernel and then built their security model around ensuring that everything that interacted with it was only using a set of primitives that they could "guarantee" to be "safe".

Could someone who actually knows about this kind of thing let me know if I am even roughly in the ballpark of correct here?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: