top | item 23968266 (no title) kingkilr | 5 years ago Lots of drivers, network protocols, etc. in the kernel, and they're most of the attack surface -- not the scheduler :-)We have to approach this as a question of how, not if. When we do that, we can change computer security. discuss order hn newest No comments yet.
No comments yet.