logoalt Hacker News

vouwfietsmanyesterday at 5:42 PM0 repliesview on HN

Just to continue the idea: you wouldn't be constraining or tagging functions, you would relinquish control to a system that closely guards how you produce side effects. e.g doing a raw HTTP request from a task is prohibited, not intercepted.