logoalt Hacker News

justatdotintoday at 7:44 AM0 repliesview on HN

anywhere you want hard isolation and only a subset of OS. especially multiple instances thereof.

so, generally at the edge (gateways, shims, protocol boundaries)