top | item 23968266

(no title)

kingkilr | 5 years ago

Lots of drivers, network protocols, etc. in the kernel, and they're most of the attack surface -- not the scheduler :-)

We have to approach this as a question of how, not if. When we do that, we can change computer security.

discuss

order

No comments yet.