Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, this is an ordinary Linux binary.

The attack surface is different, you may be interested in https://archive.fosdem.org/2019/schedule/event/solo5_unikern... and/or https://archive.fosdem.org/2019/schedule/event/solo5_unikern... :)

TL;DR: hardware virtualization is pushing trust into hardware -- but can you trust the hardware implementation (to isolate memory)?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: