top | item 42921471 (no title) hb-robo | 1 year ago That's quite interesting. This is way outside of my wheelhouse - has this kind of approach been tried in other security contexts before? What would you even call that, virtualization? discuss order hn newest dmitrygr|1 year ago The word is "bytecode" and the idea is as old as computing. tubs|1 year ago Java.
dmitrygr|1 year ago
tubs|1 year ago