Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I think the only real fully-encompassing solution to this is a redesign in how we use computers.

You can do a lot by separating these speedup mechanisms across security boundaries. The biggest factor that makes this hard to mitigate is in-process security boundaries. Total isolation between processes is neither necessary nor sufficient.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: