| ▲ | fsflover an hour ago | |
Which other approach to security do you consider reliable? Through correctness? Through obscurity? https://blog.invisiblethings.org/2008/09/02/three-approaches... | ||
| ▲ | Joel_Mckay an hour ago | parent [-] | |
Publicly documented encrypted mmu, as it is the only practical way to isolate contexts on parallel cores. Or some exotic processor no one would ever sell successfully. =3 | ||