Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Isn’t that precisely a use case for sand boxing? If I know zoom doesn’t need file system, I can deny it access and guarantee it doesn’t use the file system without me knowing about it.


If you don't trust an application, sandboxing is one way to go. But that goes all the way down. If you don't trust docker and the OS, run them in a VM. If you don't trust the VM, run it on a spare computer. If you don't trust that computer's hardware, then use minecraft to make a PC with your own instruction set :) Same with networking. Use HTTPS. No? Also use a VPN. No? Make your own VPN. No? Use smoke signals with one-time pad encryption..

In the end you decide at what point are you willing to delegate responsibility for things working as they say they should.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: