top | item 42921471

(no title)

hb-robo | 1 year ago

That's quite interesting. This is way outside of my wheelhouse - has this kind of approach been tried in other security contexts before? What would you even call that, virtualization?

discuss

order

dmitrygr|1 year ago

The word is "bytecode" and the idea is as old as computing.

tubs|1 year ago

Java.