Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, I agree with you. What you are describing is exactly how the examples I gave above are designed. I didn't mean to imply that the whole OS should be considered "trusted", but rather just the security critical components.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: