logoalt Hacker News

fsfloveryesterday at 11:54 AM1 replyview on HN

Which other approach to security do you consider reliable? Through correctness? Through obscurity?

https://blog.invisiblethings.org/2008/09/02/three-approaches...


Replies

Joel_Mckayyesterday at 11:59 AM

Publicly documented encrypted mmu, as it is the only practical way to isolate contexts on parallel cores.

Or some exotic processor no one would ever sell successfully. =3

show 1 reply