Hacker News new | past | comments | ask | show | jobs | submit login

> You can and should wisely decide just how much risk you are willing to take

That requires informed consent. But we can see that people are not well informed: many don't realize that a web broswer or an attacker accessible network stack are attack vectors.

I've been using these options for a while (well, mitigations=off is new to me)... on dedicated rendering computers that are on a port isolated network inaccessible to the internet and without the ability to make outgoing connections at all.

That's probably (I hope?) a reasonable usecase for these settings... but not exactly a super common one.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: